<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 19:54:57 +0000</lastBuildDate>
    <item>
      <title>838c8ffa-c4ce-48f2-b336-45038ee0e300</title>
      <link>https://vulnerability.circl.lu/sighting/838c8ffa-c4ce-48f2-b336-45038ee0e300/export</link>
      <description>{"uuid": "838c8ffa-c4ce-48f2-b336-45038ee0e300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46175", "type": "published-proof-of-concept", "source": "https://t.me/hackprotectsi/216", "content": "https://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/", "creation_timestamp": "2022-12-29T15:09:28.000000Z"}</description>
      <content:encoded>{"uuid": "838c8ffa-c4ce-48f2-b336-45038ee0e300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46175", "type": "published-proof-of-concept", "source": "https://t.me/hackprotectsi/216", "content": "https://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/", "creation_timestamp": "2022-12-29T15:09:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/838c8ffa-c4ce-48f2-b336-45038ee0e300/export</guid>
      <pubDate>Thu, 29 Dec 2022 15:09:28 +0000</pubDate>
    </item>
    <item>
      <title>106baf94-710a-4e14-9790-e1f42abee210</title>
      <link>https://vulnerability.circl.lu/sighting/106baf94-710a-4e14-9790-e1f42abee210/export</link>
      <description>{"uuid": "106baf94-710a-4e14-9790-e1f42abee210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46177", "type": "seen", "source": "https://t.me/cibsecurity/56010", "content": "\u203c CVE-2022-46177 \u203c\n\nDiscourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-05T22:19:23.000000Z"}</description>
      <content:encoded>{"uuid": "106baf94-710a-4e14-9790-e1f42abee210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46177", "type": "seen", "source": "https://t.me/cibsecurity/56010", "content": "\u203c CVE-2022-46177 \u203c\n\nDiscourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-05T22:19:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/106baf94-710a-4e14-9790-e1f42abee210/export</guid>
      <pubDate>Thu, 05 Jan 2023 22:19:23 +0000</pubDate>
    </item>
    <item>
      <title>f1ece49d-834b-49f8-a603-dce83b4a825e</title>
      <link>https://vulnerability.circl.lu/sighting/f1ece49d-834b-49f8-a603-dce83b4a825e/export</link>
      <description>{"uuid": "f1ece49d-834b-49f8-a603-dce83b4a825e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46176", "type": "seen", "source": "https://t.me/cibsecurity/56396", "content": "\u203c CVE-2022-46176 \u203c\n\nCargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url..insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T00:36:03.000000Z"}</description>
      <content:encoded>{"uuid": "f1ece49d-834b-49f8-a603-dce83b4a825e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46176", "type": "seen", "source": "https://t.me/cibsecurity/56396", "content": "\u203c CVE-2022-46176 \u203c\n\nCargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url..insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-12T00:36:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f1ece49d-834b-49f8-a603-dce83b4a825e/export</guid>
      <pubDate>Thu, 12 Jan 2023 00:36:03 +0000</pubDate>
    </item>
    <item>
      <title>463cda5e-8845-452c-97ce-a619614a42e9</title>
      <link>https://vulnerability.circl.lu/sighting/463cda5e-8845-452c-97ce-a619614a42e9/export</link>
      <description>{"uuid": "463cda5e-8845-452c-97ce-a619614a42e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46175", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6854", "content": "CVE-2022-46175: JSON5 Prototype Pollution Vulnerability\n\nhttps://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/", "creation_timestamp": "2023-02-02T11:44:54.000000Z"}</description>
      <content:encoded>{"uuid": "463cda5e-8845-452c-97ce-a619614a42e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46175", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/6854", "content": "CVE-2022-46175: JSON5 Prototype Pollution Vulnerability\n\nhttps://securityonline.info/cve-2022-46175-json5-prototype-pollution-vulnerability/", "creation_timestamp": "2023-02-02T11:44:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/463cda5e-8845-452c-97ce-a619614a42e9/export</guid>
      <pubDate>Thu, 02 Feb 2023 11:44:54 +0000</pubDate>
    </item>
    <item>
      <title>c8f27b08-16fa-466e-b3bc-8fef0486e0e4</title>
      <link>https://vulnerability.circl.lu/sighting/c8f27b08-16fa-466e-b3bc-8fef0486e0e4/export</link>
      <description>{"uuid": "c8f27b08-16fa-466e-b3bc-8fef0486e0e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46177", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7071", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46177\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.\n\ud83d\udccf Published: 2023-01-05T19:48:05.483Z\n\ud83d\udccf Modified: 2025-03-10T21:31:57.876Z\n\ud83d\udd17 References:\n1. https://github.com/discourse/discourse/security/advisories/GHSA-5www-jxvf-vrc3\n2. https://github.com/discourse/discourse/commit/4bf306f0e3bf54a9ef9c5886bf1cfb85c20da570\n3. https://github.com/discourse/discourse/commit/83944213b2b2454af80d0407f60d67641b1f0b38", "creation_timestamp": "2025-03-10T21:39:28.000000Z"}</description>
      <content:encoded>{"uuid": "c8f27b08-16fa-466e-b3bc-8fef0486e0e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46177", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7071", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46177\n\ud83d\udd25 CVSS Score: 5.7 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 3.0.0.beta16 on the `beta` and `tests-passed` branches, when a user requests for a password reset link email, then changes their primary email, the old reset email is still valid. When the old reset email is used to reset the password, the Discourse account's primary email would be re-linked to the old email. If the old email address is compromised or has transferred ownership, this leads to an account takeover. This is however mitigated by the SiteSetting `email_token_valid_hours` which is currently 48 hours. Users should upgrade to versions 2.8.14 or 3.0.0.beta15 to receive a patch. As a workaround, lower `email_token_valid_hours ` as needed.\n\ud83d\udccf Published: 2023-01-05T19:48:05.483Z\n\ud83d\udccf Modified: 2025-03-10T21:31:57.876Z\n\ud83d\udd17 References:\n1. https://github.com/discourse/discourse/security/advisories/GHSA-5www-jxvf-vrc3\n2. https://github.com/discourse/discourse/commit/4bf306f0e3bf54a9ef9c5886bf1cfb85c20da570\n3. https://github.com/discourse/discourse/commit/83944213b2b2454af80d0407f60d67641b1f0b38", "creation_timestamp": "2025-03-10T21:39:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c8f27b08-16fa-466e-b3bc-8fef0486e0e4/export</guid>
      <pubDate>Mon, 10 Mar 2025 21:39:28 +0000</pubDate>
    </item>
    <item>
      <title>34d861c2-c35a-4441-ade7-d0e754ea9b49</title>
      <link>https://vulnerability.circl.lu/sighting/34d861c2-c35a-4441-ade7-d0e754ea9b49/export</link>
      <description>{"uuid": "34d861c2-c35a-4441-ade7-d0e754ea9b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46178", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11318", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46178\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds.\n\ud83d\udccf Published: 2022-12-29T18:09:38.842Z\n\ud83d\udccf Modified: 2025-04-10T19:41:30.356Z\n\ud83d\udd17 References:\n1. https://github.com/metersphere/metersphere/security/advisories/GHSA-9p62-x3c5-hr5p", "creation_timestamp": "2025-04-10T19:49:03.000000Z"}</description>
      <content:encoded>{"uuid": "34d861c2-c35a-4441-ade7-d0e754ea9b49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46178", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11318", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46178\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds.\n\ud83d\udccf Published: 2022-12-29T18:09:38.842Z\n\ud83d\udccf Modified: 2025-04-10T19:41:30.356Z\n\ud83d\udd17 References:\n1. https://github.com/metersphere/metersphere/security/advisories/GHSA-9p62-x3c5-hr5p", "creation_timestamp": "2025-04-10T19:49:03.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34d861c2-c35a-4441-ade7-d0e754ea9b49/export</guid>
      <pubDate>Thu, 10 Apr 2025 19:49:03 +0000</pubDate>
    </item>
    <item>
      <title>cfca9d56-9811-423a-8de6-680de4fec5a8</title>
      <link>https://vulnerability.circl.lu/sighting/cfca9d56-9811-423a-8de6-680de4fec5a8/export</link>
      <description>{"uuid": "cfca9d56-9811-423a-8de6-680de4fec5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46173", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46173\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn't found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50.\n\n\ud83d\udccf Published: 2022-12-28T06:27:55.036Z\n\ud83d\udccf Modified: 2025-04-11T15:46:02.255Z\n\ud83d\udd17 References:\n1. https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-p228-4mrh-ww7r\n2. https://github.com/ElrondNetwork/elrond-go/pull/4718\n3. https://github.com/ElrondNetwork/elrond-go/commit/39d7ddcb08bb34217dab6daef7cd9d287fb8cab3", "creation_timestamp": "2025-04-11T15:50:45.000000Z"}</description>
      <content:encoded>{"uuid": "cfca9d56-9811-423a-8de6-680de4fec5a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46173", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11440", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46173\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L)\n\ud83d\udd39 Description: Elrond-GO is a go implementation for the Elrond Network protocol. Versions prior to 1.3.50 are subject to a processing issue where nodes are affected when trying to process a cross-shard relayed transaction with a smart contract deploy transaction data. The problem was a bad correlation between the transaction caches and the processing component. If the above-mentioned transaction was sent with more gas than required, the smart contract result (SCR transaction) that should have returned the leftover gas, would have been wrongly added to a cache that the processing unit did not consider. The node stopped notarizing metachain blocks. The fix was actually to extend the SCR transaction search in all other caches if it wasn't found in the correct (expected) sharded-cache. There are no known workarounds at this time. This issue has been patched in version 1.3.50.\n\n\ud83d\udccf Published: 2022-12-28T06:27:55.036Z\n\ud83d\udccf Modified: 2025-04-11T15:46:02.255Z\n\ud83d\udd17 References:\n1. https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-p228-4mrh-ww7r\n2. https://github.com/ElrondNetwork/elrond-go/pull/4718\n3. https://github.com/ElrondNetwork/elrond-go/commit/39d7ddcb08bb34217dab6daef7cd9d287fb8cab3", "creation_timestamp": "2025-04-11T15:50:45.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/cfca9d56-9811-423a-8de6-680de4fec5a8/export</guid>
      <pubDate>Fri, 11 Apr 2025 15:50:45 +0000</pubDate>
    </item>
    <item>
      <title>5ece5676-42ff-4f9f-9f96-52cebfece53d</title>
      <link>https://vulnerability.circl.lu/sighting/5ece5676-42ff-4f9f-9f96-52cebfece53d/export</link>
      <description>{"uuid": "5ece5676-42ff-4f9f-9f96-52cebfece53d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46174", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11441", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46174\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer\u2019s local mount points to that customer\u2019s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later.\n\ud83d\udccf Published: 2022-12-28T06:46:43.859Z\n\ud83d\udccf Modified: 2025-04-11T15:45:05.380Z\n\ud83d\udd17 References:\n1. https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932\n2. https://github.com/aws/efs-utils/issues/125\n3. https://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d", "creation_timestamp": "2025-04-11T15:50:46.000000Z"}</description>
      <content:encoded>{"uuid": "5ece5676-42ff-4f9f-9f96-52cebfece53d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46174", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11441", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46174\n\ud83d\udd25 CVSS Score: 4.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer\u2019s local mount points to that customer\u2019s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later.\n\ud83d\udccf Published: 2022-12-28T06:46:43.859Z\n\ud83d\udccf Modified: 2025-04-11T15:45:05.380Z\n\ud83d\udd17 References:\n1. https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932\n2. https://github.com/aws/efs-utils/issues/125\n3. https://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d", "creation_timestamp": "2025-04-11T15:50:46.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5ece5676-42ff-4f9f-9f96-52cebfece53d/export</guid>
      <pubDate>Fri, 11 Apr 2025 15:50:46 +0000</pubDate>
    </item>
    <item>
      <title>5e2a350b-b99b-458a-ad75-10c469ec5e54</title>
      <link>https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export</link>
      <description>{"uuid": "5e2a350b-b99b-458a-ad75-10c469ec5e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46179\n\ud83d\udd25 CVSS Score: 9.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)\n\ud83d\udd39 Description: LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\ud83d\udccf Published: 2022-12-28T07:00:37.036Z\n\ud83d\udccf Modified: 2025-04-14T16:20:27.821Z\n\ud83d\udd17 References:\n1. https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf\n2. https://github.com/LiuWoodsCode/LiuOS/commit/c658b4f3e57258acf5f6207a90c2f2169698ae22", "creation_timestamp": "2025-04-14T16:53:44.000000Z"}</description>
      <content:encoded>{"uuid": "5e2a350b-b99b-458a-ad75-10c469ec5e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46179\n\ud83d\udd25 CVSS Score: 9.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)\n\ud83d\udd39 Description: LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\ud83d\udccf Published: 2022-12-28T07:00:37.036Z\n\ud83d\udccf Modified: 2025-04-14T16:20:27.821Z\n\ud83d\udd17 References:\n1. https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf\n2. https://github.com/LiuWoodsCode/LiuOS/commit/c658b4f3e57258acf5f6207a90c2f2169698ae22", "creation_timestamp": "2025-04-14T16:53:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export</guid>
      <pubDate>Mon, 14 Apr 2025 16:53:44 +0000</pubDate>
    </item>
    <item>
      <title>006cff0b-d602-4b62-a6b5-688c88b36e04</title>
      <link>https://vulnerability.circl.lu/sighting/006cff0b-d602-4b62-a6b5-688c88b36e04/export</link>
      <description>{"uuid": "006cff0b-d602-4b62-a6b5-688c88b36e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46171", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11750", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46171\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Tauri is a framework for building binaries for all major desktop platforms. The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. The issue has been patched in the latest release and was backported into the currently supported 1.x branches. There are no known workarounds at the time of publication.\n\ud83d\udccf Published: 2022-12-23T13:47:56.494Z\n\ud83d\udccf Modified: 2025-04-15T03:17:21.623Z\n\ud83d\udd17 References:\n1. https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5\n2. https://github.com/tauri-apps/tauri/commit/72389b00d7b495ffd7750eb1e75a3b8537d07cf3\n3. https://github.com/tauri-apps/tauri/commit/f0602e7c294245ab6ef6fbf2a976ef398340ef58", "creation_timestamp": "2025-04-15T03:54:31.000000Z"}</description>
      <content:encoded>{"uuid": "006cff0b-d602-4b62-a6b5-688c88b36e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46171", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11750", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46171\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: Tauri is a framework for building binaries for all major desktop platforms. The filesystem glob pattern wildcards `*`, `?`, and `[...]` match file path literals and leading dots by default, which unintentionally exposes sub folder content of allowed paths. Scopes without the wildcards are not affected. As `**` allows for sub directories the behavior there is also as expected. The issue has been patched in the latest release and was backported into the currently supported 1.x branches. There are no known workarounds at the time of publication.\n\ud83d\udccf Published: 2022-12-23T13:47:56.494Z\n\ud83d\udccf Modified: 2025-04-15T03:17:21.623Z\n\ud83d\udd17 References:\n1. https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5\n2. https://github.com/tauri-apps/tauri/commit/72389b00d7b495ffd7750eb1e75a3b8537d07cf3\n3. https://github.com/tauri-apps/tauri/commit/f0602e7c294245ab6ef6fbf2a976ef398340ef58", "creation_timestamp": "2025-04-15T03:54:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/006cff0b-d602-4b62-a6b5-688c88b36e04/export</guid>
      <pubDate>Tue, 15 Apr 2025 03:54:31 +0000</pubDate>
    </item>
  </channel>
</rss>
