<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T09:57:36.070298+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/ebf1345d-908b-4f55-be07-0103062f2746/export</id>
    <title>ebf1345d-908b-4f55-be07-0103062f2746</title>
    <updated>2026-05-04T09:57:36.363570+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "ebf1345d-908b-4f55-be07-0103062f2746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21444", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5994", "content": "|       PRION:CVE-2022-21605    3.3     https://vulners.com/prion/PRION:CVE-2022-21605              |       PRION:CVE-2022-21604    3.3     https://vulners.com/prion/PRION:CVE-2022-21604              |       PRION:CVE-2022-21599    3.3     https://vulners.com/prion/PRION:CVE-2022-21599              |       PRION:CVE-2022-21594    3.3     https://vulners.com/prion/PRION:CVE-2022-21594              |       PRION:CVE-2021-2307     3.3     https://vulners.com/prion/PRION:CVE-2021-2307\n|       PRION:CVE-2023-21875    3.2     https://vulners.com/prion/PRION:CVE-2023-21875\n|       PRION:CVE-2022-39403    3.0     https://vulners.com/prion/PRION:CVE-2022-39403\n|       PRION:CVE-2022-21486    2.9     https://vulners.com/prion/PRION:CVE-2022-21486\n|       PRION:CVE-2022-21485    2.9     https://vulners.com/prion/PRION:CVE-2022-21485              |       PRION:CVE-2022-21484    2.9     https://vulners.com/prion/PRION:CVE-2022-21484\n|       PRION:CVE-2022-21357    2.9     https://vulners.com/prion/PRION:CVE-2022-21357\n|       PRION:CVE-2022-21355    2.9     https://vulners.com/prion/PRION:CVE-2022-21355              |       PRION:CVE-2022-21333    2.9     https://vulners.com/prion/PRION:CVE-2022-21333              |       PRION:CVE-2022-21331    2.9     https://vulners.com/prion/PRION:CVE-2022-21331\n|       PRION:CVE-2022-21325    2.9     https://vulners.com/prion/PRION:CVE-2022-21325\n|       PRION:CVE-2022-21324    2.9     https://vulners.com/prion/PRION:CVE-2022-21324\n|       PRION:CVE-2022-21323    2.9     https://vulners.com/prion/PRION:CVE-2022-21323\n|       PRION:CVE-2022-21321    2.9     https://vulners.com/prion/PRION:CVE-2022-21321              |       PRION:CVE-2022-21319    2.9     https://vulners.com/prion/PRION:CVE-2022-21319\n|       PRION:CVE-2022-21317    2.9     https://vulners.com/prion/PRION:CVE-2022-21317\n|       PRION:CVE-2022-21313    2.9     https://vulners.com/prion/PRION:CVE-2022-21313              |       PRION:CVE-2022-21312    2.9     https://vulners.com/prion/PRION:CVE-2022-21312              |       PRION:CVE-2022-21311    2.9     https://vulners.com/prion/PRION:CVE-2022-21311\n|       PRION:CVE-2019-2797     2.3     https://vulners.com/prion/PRION:CVE-2019-2797\n|       PRION:CVE-2022-39402    2.1     https://vulners.com/prion/PRION:CVE-2022-39402\n|       PRION:CVE-2022-21460    2.1     https://vulners.com/prion/PRION:CVE-2022-21460\n|       PRION:CVE-2022-21451    2.1     https://vulners.com/prion/PRION:CVE-2022-21451              |       PRION:CVE-2022-21444    2.1     https://vulners.com/prion/PRION:CVE-2022-21444\n|       PRION:CVE-2021-35632    2.1     https://vulners.com/prion/PRION:CVE-2021-35632\n|       PRION:CVE-2021-2042     2.1     https://vulners.com/prion/PRION:CVE-2021-2042               |       PRION:CVE-2019-2969     2.1     https://vulners.com/prion/PRION:CVE-2019-2969               |       PRION:CVE-2021-2232     1.9     https://vulners.com/prion/PRION:CVE-2021-2232\n|       PRION:CVE-2019-2634     1.9     https://vulners.com/prion/PRION:CVE-2019-2634\n|       PRION:CVE-2019-2535     1.9     https://vulners.com/prion/PRION:CVE-2019-2535\n|       PRION:CVE-2018-3174     1.9     https://vulners.com/prion/PRION:CVE-2018-3174\n|       PRION:CVE-2018-3084     1.9     https://vulners.com/prion/PRION:CVE-2018-3084\n|       PRION:CVE-2023-22058    1.7     https://vulners.com/prion/PRION:CVE-2023-22058\n|       PRION:CVE-2022-21625    1.7     https://vulners.com/prion/PRION:CVE-2022-21625\n|       PRION:CVE-2022-21595    1.7     https://vulners.com/prion/PRION:CVE-2022-21595              |       PRION:CVE-2019-2536     1.2     https://vulners.com/prion/PRION:CVE-2019-2536\n|       PRION:CVE-2019-2513     1.2     https://vulners.com/prion/PRION:CVE-2019-2513\n|_      PRION:CVE-2022-21611    0.8     https://vulners.com/prion/PRION:CVE-2022-21611              8443/tcp  closed https-alt       conn-refused     30000/tcp closed ndmps           conn-refused     30718/tcp closed unknown         conn-refused     30951/tcp closed unknown         conn-refused", "creation_timestamp": "2023-11-15T17:01:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/ebf1345d-908b-4f55-be07-0103062f2746/export"/>
    <published>2023-11-15T17:01:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8da8ee2a-a147-4f77-896e-2716dd605967/export</id>
    <title>8da8ee2a-a147-4f77-896e-2716dd605967</title>
    <updated>2026-05-04T09:57:36.363469+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8da8ee2a-a147-4f77-896e-2716dd605967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21445", "type": "seen", "source": "https://t.me/arpsyndicate/2553", "content": "#ExploitObserverAlert\n\nCVE-2022-21445\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2022-21445. Vulnerability in the Oracle JDeveloper product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle JDeveloper. Successful attacks of this vulnerability can result in takeover of Oracle JDeveloper. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\nFIRST-EPSS: 0.007050000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-06T16:03:22.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8da8ee2a-a147-4f77-896e-2716dd605967/export"/>
    <published>2024-01-06T16:03:22+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/43657635-c8f9-49da-9da2-6a1b13b01ecd/export</id>
    <title>43657635-c8f9-49da-9da2-6a1b13b01ecd</title>
    <updated>2026-05-04T09:57:36.363390+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "43657635-c8f9-49da-9da2-6a1b13b01ecd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21449", "type": "published-proof-of-concept", "source": "https://t.me/ARC15INFO/578", "content": "", "creation_timestamp": "2024-08-29T06:24:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/43657635-c8f9-49da-9da2-6a1b13b01ecd/export"/>
    <published>2024-08-29T06:24:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/dcc31bab-91bd-4eb7-a0d1-4036db1fa9f8/export</id>
    <title>dcc31bab-91bd-4eb7-a0d1-4036db1fa9f8</title>
    <updated>2026-05-04T09:57:36.363308+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "dcc31bab-91bd-4eb7-a0d1-4036db1fa9f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21445", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-09-20T18:10:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/dcc31bab-91bd-4eb7-a0d1-4036db1fa9f8/export"/>
    <published>2024-09-20T18:10:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e1cff566-0f16-4cc3-acad-e43d99941551/export</id>
    <title>e1cff566-0f16-4cc3-acad-e43d99941551</title>
    <updated>2026-05-04T09:57:36.363220+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e1cff566-0f16-4cc3-acad-e43d99941551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21445", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e1cff566-0f16-4cc3-acad-e43d99941551/export"/>
    <published>2025-02-23T02:10:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1c5315a7-4f45-410e-89b1-aaf8f92e3279/export</id>
    <title>1c5315a7-4f45-410e-89b1-aaf8f92e3279</title>
    <updated>2026-05-04T09:57:36.363115+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1c5315a7-4f45-410e-89b1-aaf8f92e3279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21445", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5558", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-21445\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces).  Supported versions that are affected are 12.2.1.3.0 and  12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Development Framework (ADF).  Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). Note: Oracle Application Development Framework (ADF) is downloaded via Oracle JDeveloper Product. Please refer to Fusion Middleware Patch Advisor for more details. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\n\ud83d\udccf Published: 2022-04-19T20:37:33.000Z\n\ud83d\udccf Modified: 2025-02-26T16:46:37.726Z\n\ud83d\udd17 References:\n1. https://www.oracle.com/security-alerts/cpuapr2022.html", "creation_timestamp": "2025-02-26T17:24:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1c5315a7-4f45-410e-89b1-aaf8f92e3279/export"/>
    <published>2025-02-26T17:24:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/57ee8758-7691-484c-975f-46a50b3df779/export</id>
    <title>57ee8758-7691-484c-975f-46a50b3df779</title>
    <updated>2026-05-04T09:57:36.363024+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "57ee8758-7691-484c-975f-46a50b3df779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21445", "type": "seen", "source": "https://bsky.app/profile/talk-nerdyto-me.bsky.social/post/3ll5f5pqgn627", "content": "", "creation_timestamp": "2025-03-24T18:29:04.609317Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/57ee8758-7691-484c-975f-46a50b3df779/export"/>
    <published>2025-03-24T18:29:04.609317+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8fe47686-e471-4be5-bb45-a70f402135d6/export</id>
    <title>8fe47686-e471-4be5-bb45-a70f402135d6</title>
    <updated>2026-05-04T09:57:36.362916+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8fe47686-e471-4be5-bb45-a70f402135d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21449", "type": "seen", "source": "https://gist.github.com/Psynosaur/7a31ba2c0d1286e1daf3686d35f77e10", "content": "", "creation_timestamp": "2025-07-06T11:40:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8fe47686-e471-4be5-bb45-a70f402135d6/export"/>
    <published>2025-07-06T11:40:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/82b7bd0e-edd7-4d20-bc44-92e03b0fcec1/export</id>
    <title>82b7bd0e-edd7-4d20-bc44-92e03b0fcec1</title>
    <updated>2026-05-04T09:57:36.361482+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "82b7bd0e-edd7-4d20-bc44-92e03b0fcec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-21449", "type": "seen", "source": "https://gist.github.com/tauzen/e0a07a80095b49f1c46cdc8d09e52264", "content": "", "creation_timestamp": "2025-08-13T20:55:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/82b7bd0e-edd7-4d20-bc44-92e03b0fcec1/export"/>
    <published>2025-08-13T20:55:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/04000927-6942-42bf-812d-dcf3ab9ef114/export</id>
    <title>04000927-6942-42bf-812d-dcf3ab9ef114</title>
    <updated>2026-05-04T09:57:36.358856+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://vulnerability.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "04000927-6942-42bf-812d-dcf3ab9ef114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-21445", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/35eeac4e-0705-4912-b847-aa5c0980ae12", "content": "", "creation_timestamp": "2026-02-02T12:26:28.200832Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/04000927-6942-42bf-812d-dcf3ab9ef114/export"/>
    <published>2026-02-02T12:26:28.200832+00:00</published>
  </entry>
</feed>
