<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T16:33:15.148704+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fdc55614-f5f8-4462-9416-c1e9484dd135/export</id>
    <title>fdc55614-f5f8-4462-9416-c1e9484dd135</title>
    <updated>2026-05-04T16:33:15.577474+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fdc55614-f5f8-4462-9416-c1e9484dd135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46662", "type": "seen", "source": "https://t.me/cibsecurity/55043", "content": "\u203c CVE-2022-46662 \u203c\n\nRoxio Creator LJB starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. The affected product and versions are as follows: Roxio Creator LJB version number 12.2 build number 106B62B, version number 12.2 build number 106B63A, version number 12.2 build number 106B69A, version number 12.2 build number 106B71A, and version number 12.2 build number 106B74A)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T12:13:25.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fdc55614-f5f8-4462-9416-c1e9484dd135/export"/>
    <published>2022-12-21T12:13:25+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/259794b3-7be9-41b8-ae83-8158cf4cdc01/export</id>
    <title>259794b3-7be9-41b8-ae83-8158cf4cdc01</title>
    <updated>2026-05-04T16:33:15.577290+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "259794b3-7be9-41b8-ae83-8158cf4cdc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cibsecurity/57712", "content": "\u203c CVE-2022-46663 \u203c\n\nIn GNU Less before 609, crafted data can result in \"less -R\" not filtering ANSI escape sequences sent to the terminal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T00:24:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/259794b3-7be9-41b8-ae83-8158cf4cdc01/export"/>
    <published>2023-02-08T00:24:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9928e792-a33c-4453-831b-82b3de3f7c02/export</id>
    <title>9928e792-a33c-4453-831b-82b3de3f7c02</title>
    <updated>2026-05-04T16:33:15.577102+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9928e792-a33c-4453-831b-82b3de3f7c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4666", "type": "seen", "source": "https://t.me/cibsecurity/58593", "content": "\u203c CVE-2022-4666 \u203c\n\nThe Markup (JSON-LD) structured in schema.org WordPress plugin through 4.8.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:56.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9928e792-a33c-4453-831b-82b3de3f7c02/export"/>
    <published>2023-02-21T12:21:56+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/c860bad1-cbdc-4475-944d-1f1666c726fd/export</id>
    <title>c860bad1-cbdc-4475-944d-1f1666c726fd</title>
    <updated>2026-05-04T16:33:15.576909+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "c860bad1-cbdc-4475-944d-1f1666c726fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7928", "content": "#SCADA_Security\nHacking ICS Historians:\nThe Pivot Point from IT to OT  (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, CVE-2022-38469)\nhttps://claroty.com/team82/research/hacking-ics-historians-the-pivot-point-from-it-to-ot", "creation_timestamp": "2023-03-15T11:02:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/c860bad1-cbdc-4475-944d-1f1666c726fd/export"/>
    <published>2023-03-15T11:02:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/820c5bd0-9806-4fd8-857c-5c6c272ff571/export</id>
    <title>820c5bd0-9806-4fd8-857c-5c6c272ff571</title>
    <updated>2026-05-04T16:33:15.576698+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "820c5bd0-9806-4fd8-857c-5c6c272ff571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "published-proof-of-concept", "source": "Telegram/H5Dkkha3Th8jseqkeGc7uOUCt_0lfInetyOoX5ljpqSECpk", "content": "", "creation_timestamp": "2023-03-15T13:15:26.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/820c5bd0-9806-4fd8-857c-5c6c272ff571/export"/>
    <published>2023-03-15T13:15:26+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2a5cf102-7842-4a34-bc99-d4da0c7fce37/export</id>
    <title>2a5cf102-7842-4a34-bc99-d4da0c7fce37</title>
    <updated>2026-05-04T16:33:15.576418+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2a5cf102-7842-4a34-bc99-d4da0c7fce37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cultofwire/1098", "content": "ANSI Terminal security in 2023 and finding 10 CVEs.\n\n\u041a\u0440\u0443\u0442\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0442 \u0414\u044d\u0432\u0438\u0434\u0430 \u041b\u0438\u0434\u0431\u0435\u0439\u0442\u0430 \u043f\u043e \u043f\u043e\u0438\u0441\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432 \u0441 \u0430\u043a\u0446\u0435\u043d\u0442\u043e\u043c \u043d\u0430 \u041f\u041e \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u043a\u043e\u0434\u043e\u043c. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e 10 CVE \u0434\u043b\u044f \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u043e\u0432 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (Remote Code Execution, RCE), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438.\n\n\u041c\u0435\u043d\u0435\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0437\u0434\u0435\u0441\u044c: \nThe Terminal Escapes: Engineering unexpected execution from command line interfaces\n\n\u041d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 CVE \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430:\n- CVE-2022-45872 - iTerm2 DECRQSS\n- CVE-2022-44702 - Windows Terminal + WSL working directory\n- CVE-2022-47583 - mintty DECRQSS\n- CVE-2022-45063 - xterm OSC 50\n- CVE-2022-46387 - ConEmu Title\n- CVE-2023-39150 - ConEmu Title Take 2\n- CVE-2022-4170  - rxvt-unicode background\n- CVE-2022-23465 - SwiftTerm DECRQSS\n- CVE-2022-46663 - less OSC 8\n- CVE-2023-39726 - mintty OSC 50\n- CVE-2023-40359 - xterm ReGIS\n- CVE-2023-40216 - OpenBSD wscons parameter overflow", "creation_timestamp": "2023-11-08T13:02:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2a5cf102-7842-4a34-bc99-d4da0c7fce37/export"/>
    <published>2023-11-08T13:02:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/6c38d832-f0a4-4286-840c-bf9cf7b4261d/export</id>
    <title>6c38d832-f0a4-4286-840c-bf9cf7b4261d</title>
    <updated>2026-05-04T16:33:15.574134+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "6c38d832-f0a4-4286-840c-bf9cf7b4261d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzerudhup7f2", "content": "", "creation_timestamp": "2025-09-21T20:58:25.383143Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/6c38d832-f0a4-4286-840c-bf9cf7b4261d/export"/>
    <published>2025-09-21T20:58:25.383143+00:00</published>
  </entry>
</feed>
