<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 08:37:42 +0000</lastBuildDate>
    <item>
      <title>76506224-0268-4cbd-8396-155c603c04dd</title>
      <link>https://vulnerability.circl.lu/sighting/76506224-0268-4cbd-8396-155c603c04dd/export</link>
      <description>{"uuid": "76506224-0268-4cbd-8396-155c603c04dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3826", "type": "seen", "source": "https://t.me/cibsecurity/67115", "content": "\u203c CVE-2023-3826 \u203c\n\nA vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&amp;amp;op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-22T12:24:16.000000Z"}</description>
      <content:encoded>{"uuid": "76506224-0268-4cbd-8396-155c603c04dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3826", "type": "seen", "source": "https://t.me/cibsecurity/67115", "content": "\u203c CVE-2023-3826 \u203c\n\nA vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=recruit/resume/edit&amp;amp;op=status of the component Interview Handler. The manipulation of the argument resumeid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235147. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-22T12:24:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/76506224-0268-4cbd-8396-155c603c04dd/export</guid>
      <pubDate>Sat, 22 Jul 2023 12:24:16 +0000</pubDate>
    </item>
    <item>
      <title>3bcfee3e-0748-48dd-8785-7cf7d14d0016</title>
      <link>https://vulnerability.circl.lu/sighting/3bcfee3e-0748-48dd-8785-7cf7d14d0016/export</link>
      <description>{"uuid": "3bcfee3e-0748-48dd-8785-7cf7d14d0016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38268", "type": "seen", "source": "https://t.me/ctinow/158231", "content": "https://ift.tt/9JtrKbV\nCVE-2023-38268 | IBM InfoSphere Information Server 11.7 cross-site request forgery (XFDB-260585)", "creation_timestamp": "2023-12-22T08:21:41.000000Z"}</description>
      <content:encoded>{"uuid": "3bcfee3e-0748-48dd-8785-7cf7d14d0016", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38268", "type": "seen", "source": "https://t.me/ctinow/158231", "content": "https://ift.tt/9JtrKbV\nCVE-2023-38268 | IBM InfoSphere Information Server 11.7 cross-site request forgery (XFDB-260585)", "creation_timestamp": "2023-12-22T08:21:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3bcfee3e-0748-48dd-8785-7cf7d14d0016/export</guid>
      <pubDate>Fri, 22 Dec 2023 08:21:41 +0000</pubDate>
    </item>
    <item>
      <title>78720c59-3edc-478c-8d78-a0d9d24cfc7c</title>
      <link>https://vulnerability.circl.lu/sighting/78720c59-3edc-478c-8d78-a0d9d24cfc7c/export</link>
      <description>{"uuid": "78720c59-3edc-478c-8d78-a0d9d24cfc7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/166298", "content": "https://ift.tt/xGKwHTf\nCVE-2023-38267", "creation_timestamp": "2024-01-11T04:32:10.000000Z"}</description>
      <content:encoded>{"uuid": "78720c59-3edc-478c-8d78-a0d9d24cfc7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/166298", "content": "https://ift.tt/xGKwHTf\nCVE-2023-38267", "creation_timestamp": "2024-01-11T04:32:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/78720c59-3edc-478c-8d78-a0d9d24cfc7c/export</guid>
      <pubDate>Thu, 11 Jan 2024 04:32:10 +0000</pubDate>
    </item>
    <item>
      <title>d95b168b-c594-4af0-bd20-8df5213cd480</title>
      <link>https://vulnerability.circl.lu/sighting/d95b168b-c594-4af0-bd20-8df5213cd480/export</link>
      <description>{"uuid": "d95b168b-c594-4af0-bd20-8df5213cd480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/175724", "content": "https://ift.tt/my6VjJC\nCVE-2023-38267 | IBM Security Verify Access Appliance up to 10.0.6.1 Configuration missing encryption (XFDB-260584)", "creation_timestamp": "2024-01-30T08:11:05.000000Z"}</description>
      <content:encoded>{"uuid": "d95b168b-c594-4af0-bd20-8df5213cd480", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38267", "type": "seen", "source": "https://t.me/ctinow/175724", "content": "https://ift.tt/my6VjJC\nCVE-2023-38267 | IBM Security Verify Access Appliance up to 10.0.6.1 Configuration missing encryption (XFDB-260584)", "creation_timestamp": "2024-01-30T08:11:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d95b168b-c594-4af0-bd20-8df5213cd480/export</guid>
      <pubDate>Tue, 30 Jan 2024 08:11:05 +0000</pubDate>
    </item>
    <item>
      <title>61b35030-fe3f-4ef4-83a6-8b56af4d00e5</title>
      <link>https://vulnerability.circl.lu/sighting/61b35030-fe3f-4ef4-83a6-8b56af4d00e5/export</link>
      <description>{"uuid": "61b35030-fe3f-4ef4-83a6-8b56af4d00e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/177921", "content": "https://ift.tt/bi7Y93N\nCVE-2023-38263", "creation_timestamp": "2024-02-02T05:21:34.000000Z"}</description>
      <content:encoded>{"uuid": "61b35030-fe3f-4ef4-83a6-8b56af4d00e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/177921", "content": "https://ift.tt/bi7Y93N\nCVE-2023-38263", "creation_timestamp": "2024-02-02T05:21:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61b35030-fe3f-4ef4-83a6-8b56af4d00e5/export</guid>
      <pubDate>Fri, 02 Feb 2024 05:21:34 +0000</pubDate>
    </item>
    <item>
      <title>5c914cf6-815c-4ffa-826b-e7d0678fafa9</title>
      <link>https://vulnerability.circl.lu/sighting/5c914cf6-815c-4ffa-826b-e7d0678fafa9/export</link>
      <description>{"uuid": "5c914cf6-815c-4ffa-826b-e7d0678fafa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/192593", "content": "https://ift.tt/T6UQR4g\nCVE-2023-38263 | IBM SOAR QRadar Plugin App up to 5.0.3 access control (XFDB-260577)", "creation_timestamp": "2024-02-24T14:16:32.000000Z"}</description>
      <content:encoded>{"uuid": "5c914cf6-815c-4ffa-826b-e7d0678fafa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38263", "type": "seen", "source": "https://t.me/ctinow/192593", "content": "https://ift.tt/T6UQR4g\nCVE-2023-38263 | IBM SOAR QRadar Plugin App up to 5.0.3 access control (XFDB-260577)", "creation_timestamp": "2024-02-24T14:16:32.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5c914cf6-815c-4ffa-826b-e7d0678fafa9/export</guid>
      <pubDate>Sat, 24 Feb 2024 14:16:32 +0000</pubDate>
    </item>
  </channel>
</rss>
