<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:33:53.561999+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fccb4c1c-b617-4372-a020-c2b521984f41/export</id>
    <title>fccb4c1c-b617-4372-a020-c2b521984f41</title>
    <updated>2026-05-04T10:33:53.879523+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fccb4c1c-b617-4372-a020-c2b521984f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/cibsecurity/59539", "content": "\u203c CVE-2022-45142 \u203c\n\nThe fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fccb4c1c-b617-4372-a020-c2b521984f41/export"/>
    <published>2023-03-07T02:13:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/39ec5f84-35b0-48c2-b177-affa77907ef7/export</id>
    <title>39ec5f84-35b0-48c2-b177-affa77907ef7</title>
    <updated>2026-05-04T10:33:53.879421+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "39ec5f84-35b0-48c2-b177-affa77907ef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45144", "type": "seen", "source": "https://t.me/cibsecurity/64288", "content": "\u203c CVE-2022-45144 \u203c\n\nAlgoo Tracim before 4.4.2 allows XSS via HTML file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T07:30:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/39ec5f84-35b0-48c2-b177-affa77907ef7/export"/>
    <published>2023-05-17T07:30:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c379256a-fb54-423b-b039-af51eb9684cf/export</id>
    <title>c379256a-fb54-423b-b039-af51eb9684cf</title>
    <updated>2026-05-04T10:33:53.879247+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c379256a-fb54-423b-b039-af51eb9684cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45140", "type": "seen", "source": "https://t.me/ics_cert/757", "content": "\u0647\u0634\u062f\u0627\u0631\n\u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a Wago\n\n \u0686\u0647\u0627\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0645\u0646\u0637\u0642\u06cc \u0642\u0627\u0628\u0644 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0631\u06cc\u0632\u06cc (PLC) \u0627\u0631\u0627\u0626\u0647\u200c\u062f\u0647\u0646\u062f\u0647 \u0631\u0627\u0647\u200c\u062d\u0644\u200c\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0635\u0646\u0639\u062a\u06cc \u0622\u0644\u0645\u0627\u0646\u06cc Wago \u0631\u0641\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0622\u0646\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0646\u0638\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0634\u0648\u0646\u062f.\n\n\u0631\u0627\u06cc\u0627\u0646 \u067e\u06cc\u06a9\u0631\u0646\u060c \u0645\u062a\u062e\u0635\u0635 \u0645\u0648\u0633\u0633\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u062c\u0648\u0631\u062c\u06cc\u0627\u060c \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u067e\u0627\u06cc\u0627\u0646 \u0646\u0627\u0645\u0647 \u062f\u06a9\u062a\u0631\u0627\u06cc \u062e\u0648\u062f \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc ICS\u060c \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 PLC \u0631\u0627 \u06a9\u0634\u0641 \u06a9\u0631\u062f.\n\n\u062f\u0631 \u0637\u0648\u0644 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 Wago PLC\u060c \u0645\u062d\u0642\u0642 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u062f\u0631 \u0631\u0627\u0628\u0637 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0648\u0628 \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a\u060c \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0648 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f. CERT@VDE \u0628\u0648\u0644\u062a\u0646\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0622\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0631\u0627 \u0634\u0631\u062d \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u062f\u0648 \u0646\u0642\u0635 \u062f\u0627\u0631\u0627\u06cc \u062f\u0631\u062c\u0647\u200c\u0628\u0646\u062f\u06cc \u0634\u062f\u062a \u0628\u062d\u0631\u0627\u0646\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0627\u0648\u0644\u06cc\u0646 \u0645\u0648\u0631\u062f \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0639\u062f\u0645 \u0648\u062c\u0648\u062f \u0645\u0634\u06a9\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 CVE-2022-45138 \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646 \u0648 \u062a\u0646\u0638\u06cc\u0645 \u0628\u0631\u062e\u06cc \u0627\u0632 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0633\u0627\u0632\u0634 \u06a9\u0627\u0645\u0644 \u06a9\u0646\u062a\u0631\u0644\u0631\n\n\u062f\u0648\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc\u060c CVE-2022-45140\u060c \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u062a\u0623\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0631\u06cc\u0634\u0647 \u0628\u0646\u0648\u06cc\u0633\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0648 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0646 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0634\u0648\u062f.\n\n\u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u062f\u062a \u0645\u062a\u0648\u0633\u0637 \u200b\u200b\u062f\u06cc\u06af\u0631 \u0631\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a XSS \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0628\u0627 \u062a\u0623\u062b\u06cc\u0631 \u0645\u062d\u062f\u0648\u062f \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f.\n\n\u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u0627\u06cc\u0646\u060c \u0627\u06cc\u0646 \u062e\u0637\u0627\u0647\u0627 \u0631\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0627\u06cc \u06a9\u0631\u062f \u0648 \u0628\u0647 \u062f\u0648 \u0631\u0648\u0634 \u0645\u062e\u062a\u0644\u0641 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f:\n- \u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u0633\u062a\u0642\u06cc\u0645 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f (\u06cc\u0639\u0646\u06cc \u0645\u0647\u0627\u062c\u0645 \u062f\u0631 \u062f\u0627\u062e\u0644 ICS \u0627\u0633\u062a \u06cc\u0627 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u062a\u0635\u0644 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u062d\u0645\u0644\u0647 \u0645\u06cc \u06a9\u0646\u062f).\n- \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0647\u0627\u06cc \u0648\u0628 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u062e\u062a\u0644\u0641 (\u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0645\u062b\u0627\u0644\u060c \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u062f\u06cc \u0631\u0627 \u062f\u0631 ICS \u0641\u0631\u06cc\u0628 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0648\u0628 \u0633\u0627\u06cc\u062a \u0645\u062e\u0631\u0628 \u062e\u0648\u062f \u0631\u0627 \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0646\u062f).\n\n\u0645\u062d\u0642\u0642 \u062a\u0648\u0636\u06cc\u062d \u062f\u0627\u062f \u06a9\u0647 \u0647\u06cc\u0686 \u06cc\u06a9 \u0627\u0632 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 (\u0628\u0647 \u062c\u0632 \u0628\u0627\u0632\u062f\u06cc\u062f \u0627\u0632 \u0633\u0627\u06cc\u062a) \u06cc\u0627 \u0645\u062c\u0648\u0632 \u0646\u062f\u0627\u0631\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0628\u0647 \u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u062f\u0631 \u06cc\u06a9 \u062d\u0645\u0644\u0647 \u0648\u0627\u0642\u0639\u06cc\u060c \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0645\u062e\u0631\u0628 \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645\u200c\u0647\u0627\u060c \u062c\u0639\u0644 \u062e\u0648\u0627\u0646\u062f\u0646 \u0633\u0646\u0633\u0648\u0631\u0647\u0627 \u0648 \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u062a\u0645\u0627\u0645 \u06a9\u0646\u062a\u0631\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.\n\n\u0644\u0637\u0641\u0627 \u0646\u0638\u0631\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0627\u0634\u062a\u0631\u0627\u06a9 \u0628\u06af\u0630\u0627\u0631\u06cc\u062f. \u0627\u0632 \u0628\u0627\u0632\u062e\u0648\u0631\u062f \u0634\u0645\u0627 \u0627\u0633\u062a\u0642\u0628\u0627\u0644 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645.\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-06-16T12:20:19.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c379256a-fb54-423b-b039-af51eb9684cf/export"/>
    <published>2023-06-16T12:20:19+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/b7d3eb33-e30a-456e-93af-32e0d2c0b464/export</id>
    <title>b7d3eb33-e30a-456e-93af-32e0d2c0b464</title>
    <updated>2026-05-04T10:33:53.879124+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "b7d3eb33-e30a-456e-93af-32e0d2c0b464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/27", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-09T12:33:00.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/b7d3eb33-e30a-456e-93af-32e0d2c0b464/export"/>
    <published>2023-11-09T12:33:00+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9348d85e-2e8a-4124-a8bb-5417cf50209f/export</id>
    <title>9348d85e-2e8a-4124-a8bb-5417cf50209f</title>
    <updated>2026-05-04T10:33:53.879005+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9348d85e-2e8a-4124-a8bb-5417cf50209f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/96", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-11T19:02:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9348d85e-2e8a-4124-a8bb-5417cf50209f/export"/>
    <published>2023-11-11T19:02:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/085e8ef8-0bc0-4642-a969-89574c016815/export</id>
    <title>085e8ef8-0bc0-4642-a969-89574c016815</title>
    <updated>2026-05-04T10:33:53.878894+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "085e8ef8-0bc0-4642-a969-89574c016815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6743", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45142\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:20:48.532Z\n\ud83d\udd17 References:\n1. https://www.openwall.com/lists/oss-security/2023/02/08/1\n2. https://security.gentoo.org/glsa/202310-06", "creation_timestamp": "2025-03-06T20:34:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/085e8ef8-0bc0-4642-a969-89574c016815/export"/>
    <published>2025-03-06T20:34:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/86bcdf4d-dd5e-4e7b-9abc-e14f66201dde/export</id>
    <title>86bcdf4d-dd5e-4e7b-9abc-e14f66201dde</title>
    <updated>2026-05-04T10:33:53.878777+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "86bcdf4d-dd5e-4e7b-9abc-e14f66201dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6762", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45141\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:38:07.059Z\n\ud83d\udd17 References:\n1. https://www.samba.org/samba/security/CVE-2022-45141.html\n2. https://security.gentoo.org/glsa/202309-06", "creation_timestamp": "2025-03-06T21:34:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/86bcdf4d-dd5e-4e7b-9abc-e14f66201dde/export"/>
    <published>2025-03-06T21:34:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a5084bd6-4e46-493e-8667-518c0edf216d/export</id>
    <title>a5084bd6-4e46-493e-8667-518c0edf216d</title>
    <updated>2026-05-04T10:33:53.878650+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a5084bd6-4e46-493e-8667-518c0edf216d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "Telegram/s95eVfHt72fAxS52MUWznJwr7o0bIdOGgiStyuxZUmKTJOKl", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a5084bd6-4e46-493e-8667-518c0edf216d/export"/>
    <published>2025-03-08T04:34:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d578ee3e-9d64-476b-adea-cfab42df5547/export</id>
    <title>d578ee3e-9d64-476b-adea-cfab42df5547</title>
    <updated>2026-05-04T10:33:53.878469+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d578ee3e-9d64-476b-adea-cfab42df5547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "Telegram/Sl-WKyZGV1MDcswPkINfQXSzv6-Mv5VFXzE0rZ_taj1YcWT-", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d578ee3e-9d64-476b-adea-cfab42df5547/export"/>
    <published>2025-03-08T04:34:55+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f31e59d5-a893-48ca-bbc4-c73f66f1dfa0/export</id>
    <title>f31e59d5-a893-48ca-bbc4-c73f66f1dfa0</title>
    <updated>2026-05-04T10:33:53.875672+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f31e59d5-a893-48ca-bbc4-c73f66f1dfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45145", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45145\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.\n\ud83d\udccf Published: 2022-12-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T13:54:51.643Z\n\ud83d\udd17 References:\n1. https://lists.gnu.org/archive/html/chicken-announce/2022-11/msg00000.html\n2. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=egg-compile.scm%3Bh=9ba4568113350ec75204cba55e43e27925e2d6fe%3Bhp=c1f2ceb0fb470f63c2ba2a1cf9d8d40083c2359f%3Bhb=a08f8f548d772ef410c672ba33a27108d8d434f3%3Bhpb=9c6fb001c25de4390f46ffd7c3c94237f4df92a9\n3. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3", "creation_timestamp": "2025-04-23T14:05:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f31e59d5-a893-48ca-bbc4-c73f66f1dfa0/export"/>
    <published>2025-04-23T14:05:04+00:00</published>
  </entry>
</feed>
