<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 10:33:51 +0000</lastBuildDate>
    <item>
      <title>fccb4c1c-b617-4372-a020-c2b521984f41</title>
      <link>https://vulnerability.circl.lu/sighting/fccb4c1c-b617-4372-a020-c2b521984f41/export</link>
      <description>{"uuid": "fccb4c1c-b617-4372-a020-c2b521984f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/cibsecurity/59539", "content": "\u203c CVE-2022-45142 \u203c\n\nThe fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:31.000000Z"}</description>
      <content:encoded>{"uuid": "fccb4c1c-b617-4372-a020-c2b521984f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/cibsecurity/59539", "content": "\u203c CVE-2022-45142 \u203c\n\nThe fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-07T02:13:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fccb4c1c-b617-4372-a020-c2b521984f41/export</guid>
      <pubDate>Tue, 07 Mar 2023 02:13:31 +0000</pubDate>
    </item>
    <item>
      <title>39ec5f84-35b0-48c2-b177-affa77907ef7</title>
      <link>https://vulnerability.circl.lu/sighting/39ec5f84-35b0-48c2-b177-affa77907ef7/export</link>
      <description>{"uuid": "39ec5f84-35b0-48c2-b177-affa77907ef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45144", "type": "seen", "source": "https://t.me/cibsecurity/64288", "content": "\u203c CVE-2022-45144 \u203c\n\nAlgoo Tracim before 4.4.2 allows XSS via HTML file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T07:30:59.000000Z"}</description>
      <content:encoded>{"uuid": "39ec5f84-35b0-48c2-b177-affa77907ef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45144", "type": "seen", "source": "https://t.me/cibsecurity/64288", "content": "\u203c CVE-2022-45144 \u203c\n\nAlgoo Tracim before 4.4.2 allows XSS via HTML file upload.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-17T07:30:59.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/39ec5f84-35b0-48c2-b177-affa77907ef7/export</guid>
      <pubDate>Wed, 17 May 2023 07:30:59 +0000</pubDate>
    </item>
    <item>
      <title>c379256a-fb54-423b-b039-af51eb9684cf</title>
      <link>https://vulnerability.circl.lu/sighting/c379256a-fb54-423b-b039-af51eb9684cf/export</link>
      <description>{"uuid": "c379256a-fb54-423b-b039-af51eb9684cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45140", "type": "seen", "source": "https://t.me/ics_cert/757", "content": "\u0647\u0634\u062f\u0627\u0631\n\u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a Wago\n\n \u0686\u0647\u0627\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0645\u0646\u0637\u0642\u06cc \u0642\u0627\u0628\u0644 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0631\u06cc\u0632\u06cc (PLC) \u0627\u0631\u0627\u0626\u0647\u200c\u062f\u0647\u0646\u062f\u0647 \u0631\u0627\u0647\u200c\u062d\u0644\u200c\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0635\u0646\u0639\u062a\u06cc \u0622\u0644\u0645\u0627\u0646\u06cc Wago \u0631\u0641\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0622\u0646\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0646\u0638\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0634\u0648\u0646\u062f.\n\n\u0631\u0627\u06cc\u0627\u0646 \u067e\u06cc\u06a9\u0631\u0646\u060c \u0645\u062a\u062e\u0635\u0635 \u0645\u0648\u0633\u0633\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u062c\u0648\u0631\u062c\u06cc\u0627\u060c \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u067e\u0627\u06cc\u0627\u0646 \u0646\u0627\u0645\u0647 \u062f\u06a9\u062a\u0631\u0627\u06cc \u062e\u0648\u062f \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc ICS\u060c \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 PLC \u0631\u0627 \u06a9\u0634\u0641 \u06a9\u0631\u062f.\n\n\u062f\u0631 \u0637\u0648\u0644 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 Wago PLC\u060c \u0645\u062d\u0642\u0642 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u062f\u0631 \u0631\u0627\u0628\u0637 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0648\u0628 \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a\u060c \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0648 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f. CERT@VDE \u0628\u0648\u0644\u062a\u0646\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0622\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0631\u0627 \u0634\u0631\u062d \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u062f\u0648 \u0646\u0642\u0635 \u062f\u0627\u0631\u0627\u06cc \u062f\u0631\u062c\u0647\u200c\u0628\u0646\u062f\u06cc \u0634\u062f\u062a \u0628\u062d\u0631\u0627\u0646\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0627\u0648\u0644\u06cc\u0646 \u0645\u0648\u0631\u062f \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0639\u062f\u0645 \u0648\u062c\u0648\u062f \u0645\u0634\u06a9\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 CVE-2022-45138 \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646 \u0648 \u062a\u0646\u0638\u06cc\u0645 \u0628\u0631\u062e\u06cc \u0627\u0632 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0633\u0627\u0632\u0634 \u06a9\u0627\u0645\u0644 \u06a9\u0646\u062a\u0631\u0644\u0631\n\n\u062f\u0648\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc\u060c CVE-2022-45140\u060c \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u062a\u0623\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0631\u06cc\u0634\u0647 \u0628\u0646\u0648\u06cc\u0633\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0648 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0646 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0634\u0648\u062f.\n\n\u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u062f\u062a \u0645\u062a\u0648\u0633\u0637 \u200b\u200b\u062f\u06cc\u06af\u0631 \u0631\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a XSS \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0628\u0627 \u062a\u0623\u062b\u06cc\u0631 \u0645\u062d\u062f\u0648\u062f \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f.\n\n\u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u0627\u06cc\u0646\u060c \u0627\u06cc\u0646 \u062e\u0637\u0627\u0647\u0627 \u0631\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0627\u06cc \u06a9\u0631\u062f \u0648 \u0628\u0647 \u062f\u0648 \u0631\u0648\u0634 \u0645\u062e\u062a\u0644\u0641 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f:\n- \u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u0633\u062a\u0642\u06cc\u0645 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f (\u06cc\u0639\u0646\u06cc \u0645\u0647\u0627\u062c\u0645 \u062f\u0631 \u062f\u0627\u062e\u0644 ICS \u0627\u0633\u062a \u06cc\u0627 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u062a\u0635\u0644 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u062d\u0645\u0644\u0647 \u0645\u06cc \u06a9\u0646\u062f).\n- \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0647\u0627\u06cc \u0648\u0628 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u062e\u062a\u0644\u0641 (\u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0645\u062b\u0627\u0644\u060c \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u062f\u06cc \u0631\u0627 \u062f\u0631 ICS \u0641\u0631\u06cc\u0628 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0648\u0628 \u0633\u0627\u06cc\u062a \u0645\u062e\u0631\u0628 \u062e\u0648\u062f \u0631\u0627 \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0646\u062f).\n\n\u0645\u062d\u0642\u0642 \u062a\u0648\u0636\u06cc\u062d \u062f\u0627\u062f \u06a9\u0647 \u0647\u06cc\u0686 \u06cc\u06a9 \u0627\u0632 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 (\u0628\u0647 \u062c\u0632 \u0628\u0627\u0632\u062f\u06cc\u062f \u0627\u0632 \u0633\u0627\u06cc\u062a) \u06cc\u0627 \u0645\u062c\u0648\u0632 \u0646\u062f\u0627\u0631\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0628\u0647 \u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u062f\u0631 \u06cc\u06a9 \u062d\u0645\u0644\u0647 \u0648\u0627\u0642\u0639\u06cc\u060c \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0645\u062e\u0631\u0628 \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645\u200c\u0647\u0627\u060c \u062c\u0639\u0644 \u062e\u0648\u0627\u0646\u062f\u0646 \u0633\u0646\u0633\u0648\u0631\u0647\u0627 \u0648 \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u062a\u0645\u0627\u0645 \u06a9\u0646\u062a\u0631\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.\n\n\u0644\u0637\u0641\u0627 \u0646\u0638\u0631\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0627\u0634\u062a\u0631\u0627\u06a9 \u0628\u06af\u0630\u0627\u0631\u06cc\u062f. \u0627\u0632 \u0628\u0627\u0632\u062e\u0648\u0631\u062f \u0634\u0645\u0627 \u0627\u0633\u062a\u0642\u0628\u0627\u0644 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645.\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-06-16T12:20:19.000000Z"}</description>
      <content:encoded>{"uuid": "c379256a-fb54-423b-b039-af51eb9684cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45140", "type": "seen", "source": "https://t.me/ics_cert/757", "content": "\u0647\u0634\u062f\u0627\u0631\n\u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a Wago\n\n \u0686\u0647\u0627\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0645\u0646\u0637\u0642\u06cc \u0642\u0627\u0628\u0644 \u0628\u0631\u0646\u0627\u0645\u0647\u200c\u0631\u06cc\u0632\u06cc (PLC) \u0627\u0631\u0627\u0626\u0647\u200c\u062f\u0647\u0646\u062f\u0647 \u0631\u0627\u0647\u200c\u062d\u0644\u200c\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0635\u0646\u0639\u062a\u06cc \u0622\u0644\u0645\u0627\u0646\u06cc Wago \u0631\u0641\u0639 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631\u062e\u06cc \u0627\u0632 \u0622\u0646\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0627\u0645\u0644 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0646\u0638\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0634\u0648\u0646\u062f.\n\n\u0631\u0627\u06cc\u0627\u0646 \u067e\u06cc\u06a9\u0631\u0646\u060c \u0645\u062a\u062e\u0635\u0635 \u0645\u0648\u0633\u0633\u0647 \u0641\u0646\u0627\u0648\u0631\u06cc \u062c\u0648\u0631\u062c\u06cc\u0627\u060c \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0628\u062e\u0634\u06cc \u0627\u0632 \u067e\u0627\u06cc\u0627\u0646 \u0646\u0627\u0645\u0647 \u062f\u06a9\u062a\u0631\u0627\u06cc \u062e\u0648\u062f \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u0645\u0646\u06cc\u062a \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc ICS\u060c \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 PLC \u0631\u0627 \u06a9\u0634\u0641 \u06a9\u0631\u062f.\n\n\u062f\u0631 \u0637\u0648\u0644 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 Wago PLC\u060c \u0645\u062d\u0642\u0642 \u0686\u0646\u062f\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u062f\u0631 \u0631\u0627\u0628\u0637 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 \u0648\u0628 \u0628\u0631\u0627\u06cc \u0645\u062f\u06cc\u0631\u06cc\u062a\u060c \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0648 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f. CERT@VDE \u0628\u0648\u0644\u062a\u0646\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0622\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u060c \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0648 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u062f\u06cc\u062f\u0647 \u0631\u0627 \u0634\u0631\u062d \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u062f\u0648 \u0646\u0642\u0635 \u062f\u0627\u0631\u0627\u06cc \u062f\u0631\u062c\u0647\u200c\u0628\u0646\u062f\u06cc \u0634\u062f\u062a \u0628\u062d\u0631\u0627\u0646\u06cc \u0634\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0627\u0648\u0644\u06cc\u0646 \u0645\u0648\u0631\u062f \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0639\u062f\u0645 \u0648\u062c\u0648\u062f \u0645\u0634\u06a9\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 CVE-2022-45138 \u0631\u062f\u06cc\u0627\u0628\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646 \u0648 \u062a\u0646\u0638\u06cc\u0645 \u0628\u0631\u062e\u06cc \u0627\u0632 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0633\u0627\u0632\u0634 \u06a9\u0627\u0645\u0644 \u06a9\u0646\u062a\u0631\u0644\u0631\n\n\u062f\u0648\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062d\u06cc\u0627\u062a\u06cc\u060c CVE-2022-45140\u060c \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u062a\u0623\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u0631\u06cc\u0634\u0647 \u0628\u0646\u0648\u06cc\u0633\u062f\u060c \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0648 \u0628\u0647 \u062e\u0637\u0631 \u0627\u0641\u062a\u0627\u062f\u0646 \u06a9\u0627\u0645\u0644 \u0633\u06cc\u0633\u062a\u0645 \u0634\u0648\u062f.\n\n\u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u062f\u062a \u0645\u062a\u0648\u0633\u0637 \u200b\u200b\u062f\u06cc\u06af\u0631 \u0631\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0627\u062a XSS \u0648 \u0627\u0641\u0634\u0627\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0628\u0627 \u062a\u0623\u062b\u06cc\u0631 \u0645\u062d\u062f\u0648\u062f \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f.\n\n\u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u0627\u06cc\u0646\u060c \u0627\u06cc\u0646 \u062e\u0637\u0627\u0647\u0627 \u0631\u0627 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0627\u06cc \u06a9\u0631\u062f \u0648 \u0628\u0647 \u062f\u0648 \u0631\u0648\u0634 \u0645\u062e\u062a\u0644\u0641 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f:\n- \u0647\u0646\u06af\u0627\u0645\u06cc \u06a9\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u0645\u0633\u062a\u0642\u06cc\u0645 \u0628\u0647 \u0634\u0628\u06a9\u0647 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f (\u06cc\u0639\u0646\u06cc \u0645\u0647\u0627\u062c\u0645 \u062f\u0631 \u062f\u0627\u062e\u0644 ICS \u0627\u0633\u062a \u06cc\u0627 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0645\u062a\u0635\u0644 \u0628\u0647 \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u062d\u0645\u0644\u0647 \u0645\u06cc \u06a9\u0646\u062f).\n- \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0647\u0627\u06cc \u0648\u0628 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0645\u062e\u062a\u0644\u0641 (\u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u0645\u062b\u0627\u0644\u060c \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u062f\u06cc \u0631\u0627 \u062f\u0631 ICS \u0641\u0631\u06cc\u0628 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0648\u0628 \u0633\u0627\u06cc\u062a \u0645\u062e\u0631\u0628 \u062e\u0648\u062f \u0631\u0627 \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0646\u062f).\n\n\u0645\u062d\u0642\u0642 \u062a\u0648\u0636\u06cc\u062d \u062f\u0627\u062f \u06a9\u0647 \u0647\u06cc\u0686 \u06cc\u06a9 \u0627\u0632 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627 \u0646\u06cc\u0627\u0632\u06cc \u0628\u0647 \u062a\u0639\u0627\u0645\u0644 \u06a9\u0627\u0631\u0628\u0631 (\u0628\u0647 \u062c\u0632 \u0628\u0627\u0632\u062f\u06cc\u062f \u0627\u0632 \u0633\u0627\u06cc\u062a) \u06cc\u0627 \u0645\u062c\u0648\u0632 \u0646\u062f\u0627\u0631\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0632\u0646\u062c\u06cc\u0631\u0647 \u0628\u0647 \u0637\u0648\u0631 \u06a9\u0627\u0645\u0644 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0646\u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u062f\u0631 \u06cc\u06a9 \u062d\u0645\u0644\u0647 \u0648\u0627\u0642\u0639\u06cc\u060c \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0645\u062e\u0631\u0628 \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645\u200c\u0647\u0627\u060c \u062c\u0639\u0644 \u062e\u0648\u0627\u0646\u062f\u0646 \u0633\u0646\u0633\u0648\u0631\u0647\u0627 \u0648 \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u062a\u0645\u0627\u0645 \u06a9\u0646\u062a\u0631\u0644\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.\n\n\u0644\u0637\u0641\u0627 \u0646\u0638\u0631\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0627\u0634\u062a\u0631\u0627\u06a9 \u0628\u06af\u0630\u0627\u0631\u06cc\u062f. \u0627\u0632 \u0628\u0627\u0632\u062e\u0648\u0631\u062f \u0634\u0645\u0627 \u0627\u0633\u062a\u0642\u0628\u0627\u0644 \u0645\u06cc\u200c\u06a9\u0646\u06cc\u0645.\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-06-16T12:20:19.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c379256a-fb54-423b-b039-af51eb9684cf/export</guid>
      <pubDate>Fri, 16 Jun 2023 12:20:19 +0000</pubDate>
    </item>
    <item>
      <title>b7d3eb33-e30a-456e-93af-32e0d2c0b464</title>
      <link>https://vulnerability.circl.lu/sighting/b7d3eb33-e30a-456e-93af-32e0d2c0b464/export</link>
      <description>{"uuid": "b7d3eb33-e30a-456e-93af-32e0d2c0b464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/27", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-09T12:33:00.000000Z"}</description>
      <content:encoded>{"uuid": "b7d3eb33-e30a-456e-93af-32e0d2c0b464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/27", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-09T12:33:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b7d3eb33-e30a-456e-93af-32e0d2c0b464/export</guid>
      <pubDate>Thu, 09 Nov 2023 12:33:00 +0000</pubDate>
    </item>
    <item>
      <title>9348d85e-2e8a-4124-a8bb-5417cf50209f</title>
      <link>https://vulnerability.circl.lu/sighting/9348d85e-2e8a-4124-a8bb-5417cf50209f/export</link>
      <description>{"uuid": "9348d85e-2e8a-4124-a8bb-5417cf50209f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/96", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-11T19:02:08.000000Z"}</description>
      <content:encoded>{"uuid": "9348d85e-2e8a-4124-a8bb-5417cf50209f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45143", "type": "seen", "source": "https://t.me/arpsyndicate/96", "content": "#ExploitObserverAlert\n\nCVE-2022-45143\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-45143. The JsonErrorReportValve in Apache Tomcat 8.5.83, 9.0.40 to 9.0.68 and 10.1.0-M1 to 10.1.1 did not escape the type, message or description values. In some circumstances these are constructed from user provided data and it was therefore possible for users to supply values that invalidated or manipulated the JSON output.\n\nFIRST-EPSS: 0.002540000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-11-11T19:02:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9348d85e-2e8a-4124-a8bb-5417cf50209f/export</guid>
      <pubDate>Sat, 11 Nov 2023 19:02:08 +0000</pubDate>
    </item>
    <item>
      <title>085e8ef8-0bc0-4642-a969-89574c016815</title>
      <link>https://vulnerability.circl.lu/sighting/085e8ef8-0bc0-4642-a969-89574c016815/export</link>
      <description>{"uuid": "085e8ef8-0bc0-4642-a969-89574c016815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6743", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45142\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:20:48.532Z\n\ud83d\udd17 References:\n1. https://www.openwall.com/lists/oss-security/2023/02/08/1\n2. https://security.gentoo.org/glsa/202310-06", "creation_timestamp": "2025-03-06T20:34:04.000000Z"}</description>
      <content:encoded>{"uuid": "085e8ef8-0bc0-4642-a969-89574c016815", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6743", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45142\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:20:48.532Z\n\ud83d\udd17 References:\n1. https://www.openwall.com/lists/oss-security/2023/02/08/1\n2. https://security.gentoo.org/glsa/202310-06", "creation_timestamp": "2025-03-06T20:34:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/085e8ef8-0bc0-4642-a969-89574c016815/export</guid>
      <pubDate>Thu, 06 Mar 2025 20:34:04 +0000</pubDate>
    </item>
    <item>
      <title>86bcdf4d-dd5e-4e7b-9abc-e14f66201dde</title>
      <link>https://vulnerability.circl.lu/sighting/86bcdf4d-dd5e-4e7b-9abc-e14f66201dde/export</link>
      <description>{"uuid": "86bcdf4d-dd5e-4e7b-9abc-e14f66201dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6762", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45141\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:38:07.059Z\n\ud83d\udd17 References:\n1. https://www.samba.org/samba/security/CVE-2022-45141.html\n2. https://security.gentoo.org/glsa/202309-06", "creation_timestamp": "2025-03-06T21:34:31.000000Z"}</description>
      <content:encoded>{"uuid": "86bcdf4d-dd5e-4e7b-9abc-e14f66201dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6762", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45141\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).\n\ud83d\udccf Published: 2023-03-06T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-06T20:38:07.059Z\n\ud83d\udd17 References:\n1. https://www.samba.org/samba/security/CVE-2022-45141.html\n2. https://security.gentoo.org/glsa/202309-06", "creation_timestamp": "2025-03-06T21:34:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/86bcdf4d-dd5e-4e7b-9abc-e14f66201dde/export</guid>
      <pubDate>Thu, 06 Mar 2025 21:34:31 +0000</pubDate>
    </item>
    <item>
      <title>a5084bd6-4e46-493e-8667-518c0edf216d</title>
      <link>https://vulnerability.circl.lu/sighting/a5084bd6-4e46-493e-8667-518c0edf216d/export</link>
      <description>{"uuid": "a5084bd6-4e46-493e-8667-518c0edf216d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "Telegram/s95eVfHt72fAxS52MUWznJwr7o0bIdOGgiStyuxZUmKTJOKl", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</description>
      <content:encoded>{"uuid": "a5084bd6-4e46-493e-8667-518c0edf216d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45141", "type": "seen", "source": "Telegram/s95eVfHt72fAxS52MUWznJwr7o0bIdOGgiStyuxZUmKTJOKl", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a5084bd6-4e46-493e-8667-518c0edf216d/export</guid>
      <pubDate>Sat, 08 Mar 2025 04:34:55 +0000</pubDate>
    </item>
    <item>
      <title>d578ee3e-9d64-476b-adea-cfab42df5547</title>
      <link>https://vulnerability.circl.lu/sighting/d578ee3e-9d64-476b-adea-cfab42df5547/export</link>
      <description>{"uuid": "d578ee3e-9d64-476b-adea-cfab42df5547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "Telegram/Sl-WKyZGV1MDcswPkINfQXSzv6-Mv5VFXzE0rZ_taj1YcWT-", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</description>
      <content:encoded>{"uuid": "d578ee3e-9d64-476b-adea-cfab42df5547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45142", "type": "seen", "source": "Telegram/Sl-WKyZGV1MDcswPkINfQXSzv6-Mv5VFXzE0rZ_taj1YcWT-", "content": "", "creation_timestamp": "2025-03-08T04:34:55.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d578ee3e-9d64-476b-adea-cfab42df5547/export</guid>
      <pubDate>Sat, 08 Mar 2025 04:34:55 +0000</pubDate>
    </item>
    <item>
      <title>f31e59d5-a893-48ca-bbc4-c73f66f1dfa0</title>
      <link>https://vulnerability.circl.lu/sighting/f31e59d5-a893-48ca-bbc4-c73f66f1dfa0/export</link>
      <description>{"uuid": "f31e59d5-a893-48ca-bbc4-c73f66f1dfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45145", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45145\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.\n\ud83d\udccf Published: 2022-12-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T13:54:51.643Z\n\ud83d\udd17 References:\n1. https://lists.gnu.org/archive/html/chicken-announce/2022-11/msg00000.html\n2. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=egg-compile.scm%3Bh=9ba4568113350ec75204cba55e43e27925e2d6fe%3Bhp=c1f2ceb0fb470f63c2ba2a1cf9d8d40083c2359f%3Bhb=a08f8f548d772ef410c672ba33a27108d8d434f3%3Bhpb=9c6fb001c25de4390f46ffd7c3c94237f4df92a9\n3. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3", "creation_timestamp": "2025-04-23T14:05:04.000000Z"}</description>
      <content:encoded>{"uuid": "f31e59d5-a893-48ca-bbc4-c73f66f1dfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-45145", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45145\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.\n\ud83d\udccf Published: 2022-12-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T13:54:51.643Z\n\ud83d\udd17 References:\n1. https://lists.gnu.org/archive/html/chicken-announce/2022-11/msg00000.html\n2. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=egg-compile.scm%3Bh=9ba4568113350ec75204cba55e43e27925e2d6fe%3Bhp=c1f2ceb0fb470f63c2ba2a1cf9d8d40083c2359f%3Bhb=a08f8f548d772ef410c672ba33a27108d8d434f3%3Bhpb=9c6fb001c25de4390f46ffd7c3c94237f4df92a9\n3. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3", "creation_timestamp": "2025-04-23T14:05:04.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f31e59d5-a893-48ca-bbc4-c73f66f1dfa0/export</guid>
      <pubDate>Wed, 23 Apr 2025 14:05:04 +0000</pubDate>
    </item>
  </channel>
</rss>
