<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T12:46:36.194120+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d65952d0-2817-41bb-bbc9-cd58657f69c6/export</id>
    <title>d65952d0-2817-41bb-bbc9-cd58657f69c6</title>
    <updated>2026-05-06T12:46:36.622635+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d65952d0-2817-41bb-bbc9-cd58657f69c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29937", "type": "seen", "source": "https://t.me/cibsecurity/41663", "content": "\u203c CVE-2022-29937 \u203c\n\nUSU Oracle Optimization before 5.17.5 allows authenticated DataCollection users to achieve agent root access because some common OS commands are blocked but (for example) an OS command for base64 decoding is not blocked. NOTE: this is not an Oracle Corporation product.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-29T20:24:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d65952d0-2817-41bb-bbc9-cd58657f69c6/export"/>
    <published>2022-04-29T20:24:55+00:00</published>
  </entry>
</feed>
