<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 04:48:40 +0000</lastBuildDate>
    <item>
      <title>e491c289-7b29-4668-8881-47bc0f55c11f</title>
      <link>https://vulnerability.circl.lu/sighting/e491c289-7b29-4668-8881-47bc0f55c11f/export</link>
      <description>{"uuid": "e491c289-7b29-4668-8881-47bc0f55c11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21473", "type": "seen", "source": "https://t.me/cibsecurity/41118", "content": "\u203c CVE-2022-21473 \u203c\n\nVulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Treasury Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Treasury Management accessible data as well as unauthorized read access to a subset of Oracle Banking Treasury Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-20T00:24:48.000000Z"}</description>
      <content:encoded>{"uuid": "e491c289-7b29-4668-8881-47bc0f55c11f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21473", "type": "seen", "source": "https://t.me/cibsecurity/41118", "content": "\u203c CVE-2022-21473 \u203c\n\nVulnerability in the Oracle Banking Treasury Management product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Treasury Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Treasury Management accessible data as well as unauthorized read access to a subset of Oracle Banking Treasury Management accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Treasury Management. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-20T00:24:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e491c289-7b29-4668-8881-47bc0f55c11f/export</guid>
      <pubDate>Wed, 20 Apr 2022 00:24:48 +0000</pubDate>
    </item>
    <item>
      <title>13fb0948-5327-4a8a-ad4e-dd360e1fc777</title>
      <link>https://vulnerability.circl.lu/sighting/13fb0948-5327-4a8a-ad4e-dd360e1fc777/export</link>
      <description>{"uuid": "13fb0948-5327-4a8a-ad4e-dd360e1fc777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21476", "type": "seen", "source": "https://t.me/cibsecurity/41121", "content": "\u203c CVE-2022-21476 \u203c\n\nVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-20T00:24:52.000000Z"}</description>
      <content:encoded>{"uuid": "13fb0948-5327-4a8a-ad4e-dd360e1fc777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21476", "type": "seen", "source": "https://t.me/cibsecurity/41121", "content": "\u203c CVE-2022-21476 \u203c\n\nVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-20T00:24:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/13fb0948-5327-4a8a-ad4e-dd360e1fc777/export</guid>
      <pubDate>Wed, 20 Apr 2022 00:24:52 +0000</pubDate>
    </item>
    <item>
      <title>3b375869-e78e-4913-9845-f05f92e0f11c</title>
      <link>https://vulnerability.circl.lu/sighting/3b375869-e78e-4913-9845-f05f92e0f11c/export</link>
      <description>{"uuid": "3b375869-e78e-4913-9845-f05f92e0f11c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2147", "type": "seen", "source": "https://t.me/cibsecurity/45050", "content": "\u203c CVE-2022-2147 \u203c\n\nCloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-24T00:29:48.000000Z"}</description>
      <content:encoded>{"uuid": "3b375869-e78e-4913-9845-f05f92e0f11c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-2147", "type": "seen", "source": "https://t.me/cibsecurity/45050", "content": "\u203c CVE-2022-2147 \u203c\n\nCloudflare Warp for Windows from version 2022.2.95.0 contained an unquoted service path which enables arbitrary code execution leading to privilege escalation. The fix was released in version 2022.3.186.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-24T00:29:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b375869-e78e-4913-9845-f05f92e0f11c/export</guid>
      <pubDate>Fri, 24 Jun 2022 00:29:48 +0000</pubDate>
    </item>
    <item>
      <title>07a71489-248d-4e89-90c8-43027d0c8310</title>
      <link>https://vulnerability.circl.lu/sighting/07a71489-248d-4e89-90c8-43027d0c8310/export</link>
      <description>{"uuid": "07a71489-248d-4e89-90c8-43027d0c8310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21476", "type": "seen", "source": "https://bsky.app/profile/eepyxenia.bsky.social/post/3ldvtixpco22i", "content": "", "creation_timestamp": "2024-12-22T16:28:15.384740Z"}</description>
      <content:encoded>{"uuid": "07a71489-248d-4e89-90c8-43027d0c8310", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21476", "type": "seen", "source": "https://bsky.app/profile/eepyxenia.bsky.social/post/3ldvtixpco22i", "content": "", "creation_timestamp": "2024-12-22T16:28:15.384740Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/07a71489-248d-4e89-90c8-43027d0c8310/export</guid>
      <pubDate>Sun, 22 Dec 2024 16:28:15 +0000</pubDate>
    </item>
  </channel>
</rss>
