<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T13:11:43.112774+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/689efa83-81b9-47cf-a330-961d58c248ce/export</id>
    <title>689efa83-81b9-47cf-a330-961d58c248ce</title>
    <updated>2026-05-06T13:11:43.563277+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "689efa83-81b9-47cf-a330-961d58c248ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22018", "type": "seen", "source": "https://t.me/habr_com_news/19941", "content": "\u041f\u0440\u043e\u0444\u0438\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u0441\u0443\u0440\u0441 Zero Day Initiative \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2023-22018, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445 \u043d\u0430 \u0431\u0430\u0437\u0435 Oracle VirtualBox \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0430\u043d\u0441 \u043d\u0430 \u0431\u0430\u0437\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 RDP.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c", "creation_timestamp": "2023-07-27T12:56:45.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/689efa83-81b9-47cf-a330-961d58c248ce/export"/>
    <published>2023-07-27T12:56:45+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5d22c774-1060-4b23-94a9-94731c8d2e88/export</id>
    <title>5d22c774-1060-4b23-94a9-94731c8d2e88</title>
    <updated>2026-05-06T13:11:43.563123+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5d22c774-1060-4b23-94a9-94731c8d2e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22015", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5993", "content": "|       PRION:CVE-2023-22110    3.3     https://vulners.com/prion/PRION:CVE-2023-22110              |       PRION:CVE-2023-22104    3.3     https://vulners.com/prion/PRION:CVE-2023-22104              |       PRION:CVE-2023-22103    3.3     https://vulners.com/prion/PRION:CVE-2023-22103              |       PRION:CVE-2023-22097    3.3     https://vulners.com/prion/PRION:CVE-2023-22097              |       PRION:CVE-2023-22092    3.3     https://vulners.com/prion/PRION:CVE-2023-22092              |       PRION:CVE-2023-22084    3.3     https://vulners.com/prion/PRION:CVE-2023-22084              |       PRION:CVE-2023-22078    3.3     https://vulners.com/prion/PRION:CVE-2023-22078              |       PRION:CVE-2023-22070    3.3     https://vulners.com/prion/PRION:CVE-2023-22070              |       PRION:CVE-2023-22068    3.3     https://vulners.com/prion/PRION:CVE-2023-22068              |       PRION:CVE-2023-22066    3.3     https://vulners.com/prion/PRION:CVE-2023-22066              |       PRION:CVE-2023-22065    3.3     https://vulners.com/prion/PRION:CVE-2023-22065              |       PRION:CVE-2023-22064    3.3     https://vulners.com/prion/PRION:CVE-2023-22064              |       PRION:CVE-2023-22057    3.3     https://vulners.com/prion/PRION:CVE-2023-22057              |       PRION:CVE-2023-22056    3.3     https://vulners.com/prion/PRION:CVE-2023-22056              |       PRION:CVE-2023-22054    3.3     https://vulners.com/prion/PRION:CVE-2023-22054              |       PRION:CVE-2023-22032    3.3     https://vulners.com/prion/PRION:CVE-2023-22032\n|       PRION:CVE-2023-22028    3.3     https://vulners.com/prion/PRION:CVE-2023-22028              |       PRION:CVE-2023-22026    3.3     https://vulners.com/prion/PRION:CVE-2023-22026\n|       PRION:CVE-2023-22015    3.3     https://vulners.com/prion/PRION:CVE-2023-22015\n|       PRION:CVE-2023-22007    3.3     https://vulners.com/prion/PRION:CVE-2023-22007              |       PRION:CVE-2023-21982    3.3     https://vulners.com/prion/PRION:CVE-2023-21982              |       PRION:CVE-2023-21976    3.3     https://vulners.com/prion/PRION:CVE-2023-21976\n|       PRION:CVE-2023-21972    3.3     https://vulners.com/prion/PRION:CVE-2023-21972\n|       PRION:CVE-2023-21950    3.3     https://vulners.com/prion/PRION:CVE-2023-21950\n|       PRION:CVE-2023-21887    3.3     https://vulners.com/prion/PRION:CVE-2023-21887\n|       PRION:CVE-2023-21883    3.3     https://vulners.com/prion/PRION:CVE-2023-21883\n|       PRION:CVE-2023-21882    3.3     https://vulners.com/prion/PRION:CVE-2023-21882              |       PRION:CVE-2023-21881    3.3     https://vulners.com/prion/PRION:CVE-2023-21881\n|       PRION:CVE-2023-21879    3.3     https://vulners.com/prion/PRION:CVE-2023-21879\n|       PRION:CVE-2023-21878    3.3     https://vulners.com/prion/PRION:CVE-2023-21878              |       PRION:CVE-2023-21876    3.3     https://vulners.com/prion/PRION:CVE-2023-21876              |       PRION:CVE-2022-39400    3.3     https://vulners.com/prion/PRION:CVE-2022-39400\n|       PRION:CVE-2022-21641    3.3     https://vulners.com/prion/PRION:CVE-2022-21641\n|       PRION:CVE-2022-21640    3.3     https://vulners.com/prion/PRION:CVE-2022-21640\n|       PRION:CVE-2022-21638    3.3     https://vulners.com/prion/PRION:CVE-2022-21638\n|       PRION:CVE-2022-21637    3.3     https://vulners.com/prion/PRION:CVE-2022-21637              |       PRION:CVE-2022-21633    3.3     https://vulners.com/prion/PRION:CVE-2022-21633\n|       PRION:CVE-2022-21632    3.3     https://vulners.com/prion/PRION:CVE-2022-21632\n|       PRION:CVE-2022-21617    3.3     https://vulners.com/prion/PRION:CVE-2022-21617              |       PRION:CVE-2022-21608    3.3     https://vulners.com/prion/PRION:CVE-2022-21608              |       PRION:CVE-2022-21607    3.3     https://vulners.com/prion/PRION:CVE-2022-21607", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5d22c774-1060-4b23-94a9-94731c8d2e88/export"/>
    <published>2023-11-15T17:01:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d892d400-bd2c-45ee-bb69-fde9c554328f/export</id>
    <title>d892d400-bd2c-45ee-bb69-fde9c554328f</title>
    <updated>2026-05-06T13:11:43.559801+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://cve.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d892d400-bd2c-45ee-bb69-fde9c554328f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-22010", "type": "seen", "source": "https://t.me/arpsyndicate/2405", "content": "#ExploitObserverAlert\n\nCVE-2023-22010\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-22010. Vulnerability in Oracle Essbase (component: Security and Provisioning).   The supported version that is affected is 21.4.3.0.0. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Essbase.  Successful attacks of this vulnerability can result in  unauthorized read access to a subset of Oracle Essbase accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\n\nFIRST-EPSS: 0.000450000\nNVD-IS: 1.4\nNVD-ES: 0.7", "creation_timestamp": "2024-01-04T02:10:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d892d400-bd2c-45ee-bb69-fde9c554328f/export"/>
    <published>2024-01-04T02:10:55+00:00</published>
  </entry>
</feed>
