<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 14:24:45 +0000</lastBuildDate>
    <item>
      <title>7c0079f4-ff35-45e0-8b25-a748f46045c4</title>
      <link>https://vulnerability.circl.lu/sighting/7c0079f4-ff35-45e0-8b25-a748f46045c4/export</link>
      <description>{"uuid": "7c0079f4-ff35-45e0-8b25-a748f46045c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "seen", "source": "https://t.me/cibsecurity/55462", "content": "\u203c CVE-2022-46179 \u203c\n\nLiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-28T12:12:10.000000Z"}</description>
      <content:encoded>{"uuid": "7c0079f4-ff35-45e0-8b25-a748f46045c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "seen", "source": "https://t.me/cibsecurity/55462", "content": "\u203c CVE-2022-46179 \u203c\n\nLiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-28T12:12:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7c0079f4-ff35-45e0-8b25-a748f46045c4/export</guid>
      <pubDate>Wed, 28 Dec 2022 12:12:10 +0000</pubDate>
    </item>
    <item>
      <title>5e2a350b-b99b-458a-ad75-10c469ec5e54</title>
      <link>https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export</link>
      <description>{"uuid": "5e2a350b-b99b-458a-ad75-10c469ec5e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46179\n\ud83d\udd25 CVSS Score: 9.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)\n\ud83d\udd39 Description: LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\ud83d\udccf Published: 2022-12-28T07:00:37.036Z\n\ud83d\udccf Modified: 2025-04-14T16:20:27.821Z\n\ud83d\udd17 References:\n1. https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf\n2. https://github.com/LiuWoodsCode/LiuOS/commit/c658b4f3e57258acf5f6207a90c2f2169698ae22", "creation_timestamp": "2025-04-14T16:53:44.000000Z"}</description>
      <content:encoded>{"uuid": "5e2a350b-b99b-458a-ad75-10c469ec5e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46179", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11648", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-46179\n\ud83d\udd25 CVSS Score: 9.2 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H)\n\ud83d\udd39 Description: LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to \"\" (no quotes) to null the variable and force credential checks.\n\ud83d\udccf Published: 2022-12-28T07:00:37.036Z\n\ud83d\udccf Modified: 2025-04-14T16:20:27.821Z\n\ud83d\udd17 References:\n1. https://github.com/LiuWoodsCode/LiuOS/security/advisories/GHSA-f9x3-mj2r-cqmf\n2. https://github.com/LiuWoodsCode/LiuOS/commit/c658b4f3e57258acf5f6207a90c2f2169698ae22", "creation_timestamp": "2025-04-14T16:53:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5e2a350b-b99b-458a-ad75-10c469ec5e54/export</guid>
      <pubDate>Mon, 14 Apr 2025 16:53:44 +0000</pubDate>
    </item>
  </channel>
</rss>
