<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 06:10:20 +0000</lastBuildDate>
    <item>
      <title>f94fe0b2-005d-4eca-98c4-69f61ba99c9c</title>
      <link>https://vulnerability.circl.lu/sighting/f94fe0b2-005d-4eca-98c4-69f61ba99c9c/export</link>
      <description>{"uuid": "f94fe0b2-005d-4eca-98c4-69f61ba99c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39417", "type": "seen", "source": "https://t.me/cibsecurity/51716", "content": "\u203c CVE-2022-39417 \u203c\n\nVulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:28.000000Z"}</description>
      <content:encoded>{"uuid": "f94fe0b2-005d-4eca-98c4-69f61ba99c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39417", "type": "seen", "source": "https://t.me/cibsecurity/51716", "content": "\u203c CVE-2022-39417 \u203c\n\nVulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f94fe0b2-005d-4eca-98c4-69f61ba99c9c/export</guid>
      <pubDate>Wed, 19 Oct 2022 00:20:28 +0000</pubDate>
    </item>
    <item>
      <title>7c5b7883-4d6a-4b99-9681-f9ab060694a2</title>
      <link>https://vulnerability.circl.lu/sighting/7c5b7883-4d6a-4b99-9681-f9ab060694a2/export</link>
      <description>{"uuid": "7c5b7883-4d6a-4b99-9681-f9ab060694a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39410", "type": "seen", "source": "https://t.me/cibsecurity/51731", "content": "\u203c CVE-2022-39410 \u203c\n\nVulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:46.000000Z"}</description>
      <content:encoded>{"uuid": "7c5b7883-4d6a-4b99-9681-f9ab060694a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39410", "type": "seen", "source": "https://t.me/cibsecurity/51731", "content": "\u203c CVE-2022-39410 \u203c\n\nVulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c5b7883-4d6a-4b99-9681-f9ab060694a2/export</guid>
      <pubDate>Wed, 19 Oct 2022 00:20:46 +0000</pubDate>
    </item>
    <item>
      <title>9abf9d9b-c81d-463d-8f85-a8a6ba7020cc</title>
      <link>https://vulnerability.circl.lu/sighting/9abf9d9b-c81d-463d-8f85-a8a6ba7020cc/export</link>
      <description>{"uuid": "9abf9d9b-c81d-463d-8f85-a8a6ba7020cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39419", "type": "seen", "source": "https://t.me/cibsecurity/51732", "content": "\u203c CVE-2022-39419 \u203c\n\nVulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java VM accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:47.000000Z"}</description>
      <content:encoded>{"uuid": "9abf9d9b-c81d-463d-8f85-a8a6ba7020cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39419", "type": "seen", "source": "https://t.me/cibsecurity/51732", "content": "\u203c CVE-2022-39419 \u203c\n\nVulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Procedure privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java VM accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9abf9d9b-c81d-463d-8f85-a8a6ba7020cc/export</guid>
      <pubDate>Wed, 19 Oct 2022 00:20:47 +0000</pubDate>
    </item>
    <item>
      <title>db4e1cd0-f48b-4e21-bcef-a86ffb5994ac</title>
      <link>https://vulnerability.circl.lu/sighting/db4e1cd0-f48b-4e21-bcef-a86ffb5994ac/export</link>
      <description>{"uuid": "db4e1cd0-f48b-4e21-bcef-a86ffb5994ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39411", "type": "seen", "source": "https://t.me/cibsecurity/51733", "content": "\u203c CVE-2022-39411 \u203c\n\nVulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Business Process Automation). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Transportation Management accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:48.000000Z"}</description>
      <content:encoded>{"uuid": "db4e1cd0-f48b-4e21-bcef-a86ffb5994ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-39411", "type": "seen", "source": "https://t.me/cibsecurity/51733", "content": "\u203c CVE-2022-39411 \u203c\n\nVulnerability in the Oracle Transportation Management product of Oracle Supply Chain (component: Business Process Automation). Supported versions that are affected are 6.4.3 and 6.5.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Transportation Management. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Transportation Management accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-10-19T00:20:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/db4e1cd0-f48b-4e21-bcef-a86ffb5994ac/export</guid>
      <pubDate>Wed, 19 Oct 2022 00:20:48 +0000</pubDate>
    </item>
  </channel>
</rss>
