<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:24:54 +0000</lastBuildDate>
    <item>
      <title>c01883ec-86c2-4586-a4df-2d588da2d567</title>
      <link>https://vulnerability.circl.lu/sighting/c01883ec-86c2-4586-a4df-2d588da2d567/export</link>
      <description>{"uuid": "c01883ec-86c2-4586-a4df-2d588da2d567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/cibsecurity/54089", "content": "\u203c CVE-2022-43867 \u203c\n\nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T22:40:57.000000Z"}</description>
      <content:encoded>{"uuid": "c01883ec-86c2-4586-a4df-2d588da2d567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/cibsecurity/54089", "content": "\u203c CVE-2022-43867 \u203c\n\nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-06T22:40:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c01883ec-86c2-4586-a4df-2d588da2d567/export</guid>
      <pubDate>Tue, 06 Dec 2022 22:40:57 +0000</pubDate>
    </item>
    <item>
      <title>94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76</title>
      <link>https://vulnerability.circl.lu/sighting/94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76/export</link>
      <description>{"uuid": "94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43860", "type": "seen", "source": "https://t.me/cibsecurity/55275", "content": "\u203c CVE-2022-43860 \u203c\n\nIBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-24T02:14:53.000000Z"}</description>
      <content:encoded>{"uuid": "94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43860", "type": "seen", "source": "https://t.me/cibsecurity/55275", "content": "\u203c CVE-2022-43860 \u203c\n\nIBM Navigator for i 7.3, 7.4, and 7.5 could allow an authenticated user to obtain sensitive information they are authorized to but not while using this interface. By performing an SQL injection an attacker could see user profile attributes through this interface. IBM X-Force ID: 239305.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-24T02:14:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/94c70d5a-a31e-4fcb-b7fd-2a563dcd7e76/export</guid>
      <pubDate>Sat, 24 Dec 2022 02:14:53 +0000</pubDate>
    </item>
    <item>
      <title>b2b93de0-c7cb-4216-9fd1-0bd8cb396336</title>
      <link>https://vulnerability.circl.lu/sighting/b2b93de0-c7cb-4216-9fd1-0bd8cb396336/export</link>
      <description>{"uuid": "b2b93de0-c7cb-4216-9fd1-0bd8cb396336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/cibsecurity/58583", "content": "\u203c CVE-2022-4386 \u203c\n\nThe Intuitive Custom Post Order WordPress plugin through 3.1.3 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:41.000000Z"}</description>
      <content:encoded>{"uuid": "b2b93de0-c7cb-4216-9fd1-0bd8cb396336", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/cibsecurity/58583", "content": "\u203c CVE-2022-4386 \u203c\n\nThe Intuitive Custom Post Order WordPress plugin through 3.1.3 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b2b93de0-c7cb-4216-9fd1-0bd8cb396336/export</guid>
      <pubDate>Tue, 21 Feb 2023 12:21:41 +0000</pubDate>
    </item>
    <item>
      <title>a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a</title>
      <link>https://vulnerability.circl.lu/sighting/a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a/export</link>
      <description>{"uuid": "a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43863", "type": "seen", "source": "https://t.me/cibsecurity/60538", "content": "\u203c CVE-2022-43863 \u203c\n\nIBM QRadar SIEM 7.4 and 7.5 is vulnerable to privilege escalation, allowing a user with some admin capabilities to gain additional admin capabilities. IBM X-Force ID: 239425.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T01:36:09.000000Z"}</description>
      <content:encoded>{"uuid": "a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43863", "type": "seen", "source": "https://t.me/cibsecurity/60538", "content": "\u203c CVE-2022-43863 \u203c\n\nIBM QRadar SIEM 7.4 and 7.5 is vulnerable to privilege escalation, allowing a user with some admin capabilities to gain additional admin capabilities. IBM X-Force ID: 239425.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-23T01:36:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a0d5da9a-f7ae-4aa1-a2c7-b6a0c8230f1a/export</guid>
      <pubDate>Thu, 23 Mar 2023 01:36:09 +0000</pubDate>
    </item>
    <item>
      <title>45fedad9-d842-4b15-9113-04fcf7cd650a</title>
      <link>https://vulnerability.circl.lu/sighting/45fedad9-d842-4b15-9113-04fcf7cd650a/export</link>
      <description>{"uuid": "45fedad9-d842-4b15-9113-04fcf7cd650a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43866", "type": "seen", "source": "https://t.me/cibsecurity/63391", "content": "\u203c CVE-2022-43866 \u203c\n\nIBM Maximo Asset Management 7.6.1.2 and 7.6.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 239436.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T22:25:13.000000Z"}</description>
      <content:encoded>{"uuid": "45fedad9-d842-4b15-9113-04fcf7cd650a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43866", "type": "seen", "source": "https://t.me/cibsecurity/63391", "content": "\u203c CVE-2022-43866 \u203c\n\nIBM Maximo Asset Management 7.6.1.2 and 7.6.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 239436.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T22:25:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/45fedad9-d842-4b15-9113-04fcf7cd650a/export</guid>
      <pubDate>Fri, 05 May 2023 22:25:13 +0000</pubDate>
    </item>
    <item>
      <title>9b605906-681f-4e11-95d5-afdb2c0f3468</title>
      <link>https://vulnerability.circl.lu/sighting/9b605906-681f-4e11-95d5-afdb2c0f3468/export</link>
      <description>{"uuid": "9b605906-681f-4e11-95d5-afdb2c0f3468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/arpsyndicate/581", "content": "#ExploitObserverAlert\n\nCVE-2022-4386\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-4386. The Intuitive Custom Post Order WordPress plugin before 3.1.4 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\nFIRST-EPSS: 0.000460000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-26T01:39:22.000000Z"}</description>
      <content:encoded>{"uuid": "9b605906-681f-4e11-95d5-afdb2c0f3468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4386", "type": "seen", "source": "https://t.me/arpsyndicate/581", "content": "#ExploitObserverAlert\n\nCVE-2022-4386\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2022-4386. The Intuitive Custom Post Order WordPress plugin before 3.1.4 lacks CSRF protection in its update-menu-order ajax action, allowing an attacker to trick any user to change the menu order via a CSRF attack\n\nFIRST-EPSS: 0.000460000\nNVD-IS: 1.4\nNVD-ES: 2.8", "creation_timestamp": "2023-11-26T01:39:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9b605906-681f-4e11-95d5-afdb2c0f3468/export</guid>
      <pubDate>Sun, 26 Nov 2023 01:39:22 +0000</pubDate>
    </item>
    <item>
      <title>0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf</title>
      <link>https://vulnerability.circl.lu/sighting/0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf/export</link>
      <description>{"uuid": "0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43867\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\n\ud83d\udccf Published: 2022-12-06T18:12:25.807Z\n\ud83d\udccf Modified: 2025-04-23T13:41:44.178Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6844771\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/239437", "creation_timestamp": "2025-04-23T14:05:25.000000Z"}</description>
      <content:encoded>{"uuid": "0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-43867", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-43867\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: \nIBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437.\n\n\n\ud83d\udccf Published: 2022-12-06T18:12:25.807Z\n\ud83d\udccf Modified: 2025-04-23T13:41:44.178Z\n\ud83d\udd17 References:\n1. https://www.ibm.com/support/pages/node/6844771\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/239437", "creation_timestamp": "2025-04-23T14:05:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0b90ad0b-0c2f-44e5-91e0-bb6b2e96efaf/export</guid>
      <pubDate>Wed, 23 Apr 2025 14:05:25 +0000</pubDate>
    </item>
  </channel>
</rss>
