<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 09:40:16 +0000</lastBuildDate>
    <item>
      <title>3fa58b57-9091-47ec-b13c-c1a4aafbab75</title>
      <link>https://vulnerability.circl.lu/sighting/3fa58b57-9091-47ec-b13c-c1a4aafbab75/export</link>
      <description>{"uuid": "3fa58b57-9091-47ec-b13c-c1a4aafbab75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "3fa58b57-9091-47ec-b13c-c1a4aafbab75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3fa58b57-9091-47ec-b13c-c1a4aafbab75/export</guid>
      <pubDate>Sun, 26 Jan 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>ec027de3-6331-4ed6-8a3f-b917fe3debd5</title>
      <link>https://vulnerability.circl.lu/sighting/ec027de3-6331-4ed6-8a3f-b917fe3debd5/export</link>
      <description>{"uuid": "ec027de3-6331-4ed6-8a3f-b917fe3debd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-20)", "content": "", "creation_timestamp": "2025-02-20T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "ec027de3-6331-4ed6-8a3f-b917fe3debd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-20)", "content": "", "creation_timestamp": "2025-02-20T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/ec027de3-6331-4ed6-8a3f-b917fe3debd5/export</guid>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>0732a007-9abb-4269-b39a-21805b3f1d58</title>
      <link>https://vulnerability.circl.lu/sighting/0732a007-9abb-4269-b39a-21805b3f1d58/export</link>
      <description>{"uuid": "0732a007-9abb-4269-b39a-21805b3f1d58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "0732a007-9abb-4269-b39a-21805b3f1d58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0732a007-9abb-4269-b39a-21805b3f1d58/export</guid>
      <pubDate>Thu, 13 Mar 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>878d96af-edd6-4b6e-a262-338d513622ef</title>
      <link>https://vulnerability.circl.lu/sighting/878d96af-edd6-4b6e-a262-338d513622ef/export</link>
      <description>{"uuid": "878d96af-edd6-4b6e-a262-338d513622ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "878d96af-edd6-4b6e-a262-338d513622ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/878d96af-edd6-4b6e-a262-338d513622ef/export</guid>
      <pubDate>Tue, 18 Mar 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>08aa7d74-2d76-47b1-903d-210254d784d9</title>
      <link>https://vulnerability.circl.lu/sighting/08aa7d74-2d76-47b1-903d-210254d784d9/export</link>
      <description>{"uuid": "08aa7d74-2d76-47b1-903d-210254d784d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25326", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12650", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25326\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.\n\ud83d\udccf Published: 2022-02-25T11:00:13.023Z\n\ud83d\udccf Modified: 2025-04-21T13:56:31.289Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:07.000000Z"}</description>
      <content:encoded>{"uuid": "08aa7d74-2d76-47b1-903d-210254d784d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25326", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12650", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25326\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.\n\ud83d\udccf Published: 2022-02-25T11:00:13.023Z\n\ud83d\udccf Modified: 2025-04-21T13:56:31.289Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/08aa7d74-2d76-47b1-903d-210254d784d9/export</guid>
      <pubDate>Mon, 21 Apr 2025 14:02:07 +0000</pubDate>
    </item>
    <item>
      <title>fb0004a4-3687-4615-baa3-f4717f6b0306</title>
      <link>https://vulnerability.circl.lu/sighting/fb0004a4-3687-4615-baa3-f4717f6b0306/export</link>
      <description>{"uuid": "fb0004a4-3687-4615-baa3-f4717f6b0306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25327", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12651", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25327\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above\n\ud83d\udccf Published: 2022-02-25T11:00:14.437Z\n\ud83d\udccf Modified: 2025-04-21T13:56:22.478Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:08.000000Z"}</description>
      <content:encoded>{"uuid": "fb0004a4-3687-4615-baa3-f4717f6b0306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25327", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12651", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25327\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above\n\ud83d\udccf Published: 2022-02-25T11:00:14.437Z\n\ud83d\udccf Modified: 2025-04-21T13:56:22.478Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fb0004a4-3687-4615-baa3-f4717f6b0306/export</guid>
      <pubDate>Mon, 21 Apr 2025 14:02:08 +0000</pubDate>
    </item>
    <item>
      <title>896895f9-2622-4504-86a0-6e15446a213d</title>
      <link>https://vulnerability.circl.lu/sighting/896895f9-2622-4504-86a0-6e15446a213d/export</link>
      <description>{"uuid": "896895f9-2622-4504-86a0-6e15446a213d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25328", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25328\n\ud83d\udd25 CVSS Score: 5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above\n\ud83d\udccf Published: 2022-02-25T11:00:15.758Z\n\ud83d\udccf Modified: 2025-04-21T13:56:13.459Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:09.000000Z"}</description>
      <content:encoded>{"uuid": "896895f9-2622-4504-86a0-6e15446a213d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25328", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12652", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-25328\n\ud83d\udd25 CVSS Score: 5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above\n\ud83d\udccf Published: 2022-02-25T11:00:15.758Z\n\ud83d\udccf Modified: 2025-04-21T13:56:13.459Z\n\ud83d\udd17 References:\n1. https://github.com/google/fscrypt/pull/346", "creation_timestamp": "2025-04-21T14:02:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/896895f9-2622-4504-86a0-6e15446a213d/export</guid>
      <pubDate>Mon, 21 Apr 2025 14:02:09 +0000</pubDate>
    </item>
    <item>
      <title>38f76c60-f8d7-4ce1-b5ee-3c2d74a7046d</title>
      <link>https://vulnerability.circl.lu/sighting/38f76c60-f8d7-4ce1-b5ee-3c2d74a7046d/export</link>
      <description>{"uuid": "38f76c60-f8d7-4ce1-b5ee-3c2d74a7046d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-05)", "content": "", "creation_timestamp": "2025-06-05T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "38f76c60-f8d7-4ce1-b5ee-3c2d74a7046d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-05)", "content": "", "creation_timestamp": "2025-06-05T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/38f76c60-f8d7-4ce1-b5ee-3c2d74a7046d/export</guid>
      <pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>7fdfa927-abce-4903-b330-aa919068a656</title>
      <link>https://vulnerability.circl.lu/sighting/7fdfa927-abce-4903-b330-aa919068a656/export</link>
      <description>{"uuid": "7fdfa927-abce-4903-b330-aa919068a656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-11)", "content": "", "creation_timestamp": "2025-06-11T00:00:00.000000Z"}</description>
      <content:encoded>{"uuid": "7fdfa927-abce-4903-b330-aa919068a656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-11)", "content": "", "creation_timestamp": "2025-06-11T00:00:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7fdfa927-abce-4903-b330-aa919068a656/export</guid>
      <pubDate>Wed, 11 Jun 2025 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>408f6dea-4c8c-4bfd-bd26-e4c70ec86894</title>
      <link>https://vulnerability.circl.lu/sighting/408f6dea-4c8c-4bfd-bd26-e4c70ec86894/export</link>
      <description>{"uuid": "408f6dea-4c8c-4bfd-bd26-e4c70ec86894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2022/CVE-2022-25322.yaml", "content": "", "creation_timestamp": "2025-09-23T15:44:30.000000Z"}</description>
      <content:encoded>{"uuid": "408f6dea-4c8c-4bfd-bd26-e4c70ec86894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-25322", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2022/CVE-2022-25322.yaml", "content": "", "creation_timestamp": "2025-09-23T15:44:30.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/408f6dea-4c8c-4bfd-bd26-e4c70ec86894/export</guid>
      <pubDate>Tue, 23 Sep 2025 15:44:30 +0000</pubDate>
    </item>
  </channel>
</rss>
