<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T10:52:37.527872+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/7c0079f4-ff35-45e0-8b25-a748f46045c4/export</id>
    <title>7c0079f4-ff35-45e0-8b25-a748f46045c4</title>
    <updated>2026-05-05T10:52:37.850839+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "7c0079f4-ff35-45e0-8b25-a748f46045c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "seen", "source": "https://t.me/cibsecurity/55462", "content": "\u203c CVE-2022-46179 \u203c\n\nLiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-28T12:12:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/7c0079f4-ff35-45e0-8b25-a748f46045c4/export"/>
    <published>2022-12-28T12:12:10+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export</id>
    <title>5e2a350b-b99b-458a-ad75-10c469ec5e54</title>
    <updated>2026-05-05T10:52:37.849041+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "5e2a350b-b99b-458a-ad75-10c469ec5e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46179\n\ud83d\udd25 CVSS Score: 9.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)\n\ud83d\udd39 Description: LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\ud83d\udccf Published: 2022-12-28T07:00:37.036Z\n\ud83d\udccf Modified: 2025-04-14T16:20:27.821Z\n\ud83d\udd17 References:\n1. https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf\n2. https://github.com/LiuWoodsCode/LiuOS/commit/c658b4f3e57258acf5f6207a90c2f2169698ae22", "creation_timestamp": "2025-04-14T16:53:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export"/>
    <published>2025-04-14T16:53:44+00:00</published>
  </entry>
</feed>
