<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 04 May 2026 16:33:01 +0000</lastBuildDate>
    <item>
      <title>fdc55614-f5f8-4462-9416-c1e9484dd135</title>
      <link>https://vulnerability.circl.lu/sighting/fdc55614-f5f8-4462-9416-c1e9484dd135/export</link>
      <description>{"uuid": "fdc55614-f5f8-4462-9416-c1e9484dd135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46662", "type": "seen", "source": "https://t.me/cibsecurity/55043", "content": "\u203c CVE-2022-46662 \u203c\n\nRoxio Creator LJB starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. The affected product and versions are as follows: Roxio Creator LJB version number 12.2 build number 106B62B, version number 12.2 build number 106B63A, version number 12.2 build number 106B69A, version number 12.2 build number 106B71A, and version number 12.2 build number 106B74A)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T12:13:25.000000Z"}</description>
      <content:encoded>{"uuid": "fdc55614-f5f8-4462-9416-c1e9484dd135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46662", "type": "seen", "source": "https://t.me/cibsecurity/55043", "content": "\u203c CVE-2022-46662 \u203c\n\nRoxio Creator LJB starts another program with an unquoted file path. Since a registered Windows service path contains spaces and are unquoted, if a malicious executable is placed on a certain path, the executable may be executed with the privilege of the Windows service. The affected product and versions are as follows: Roxio Creator LJB version number 12.2 build number 106B62B, version number 12.2 build number 106B63A, version number 12.2 build number 106B69A, version number 12.2 build number 106B71A, and version number 12.2 build number 106B74A)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-21T12:13:25.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/fdc55614-f5f8-4462-9416-c1e9484dd135/export</guid>
      <pubDate>Wed, 21 Dec 2022 12:13:25 +0000</pubDate>
    </item>
    <item>
      <title>259794b3-7be9-41b8-ae83-8158cf4cdc01</title>
      <link>https://vulnerability.circl.lu/sighting/259794b3-7be9-41b8-ae83-8158cf4cdc01/export</link>
      <description>{"uuid": "259794b3-7be9-41b8-ae83-8158cf4cdc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cibsecurity/57712", "content": "\u203c CVE-2022-46663 \u203c\n\nIn GNU Less before 609, crafted data can result in \"less -R\" not filtering ANSI escape sequences sent to the terminal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T00:24:26.000000Z"}</description>
      <content:encoded>{"uuid": "259794b3-7be9-41b8-ae83-8158cf4cdc01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cibsecurity/57712", "content": "\u203c CVE-2022-46663 \u203c\n\nIn GNU Less before 609, crafted data can result in \"less -R\" not filtering ANSI escape sequences sent to the terminal.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T00:24:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/259794b3-7be9-41b8-ae83-8158cf4cdc01/export</guid>
      <pubDate>Wed, 08 Feb 2023 00:24:26 +0000</pubDate>
    </item>
    <item>
      <title>9928e792-a33c-4453-831b-82b3de3f7c02</title>
      <link>https://vulnerability.circl.lu/sighting/9928e792-a33c-4453-831b-82b3de3f7c02/export</link>
      <description>{"uuid": "9928e792-a33c-4453-831b-82b3de3f7c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4666", "type": "seen", "source": "https://t.me/cibsecurity/58593", "content": "\u203c CVE-2022-4666 \u203c\n\nThe Markup (JSON-LD) structured in schema.org WordPress plugin through 4.8.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:56.000000Z"}</description>
      <content:encoded>{"uuid": "9928e792-a33c-4453-831b-82b3de3f7c02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4666", "type": "seen", "source": "https://t.me/cibsecurity/58593", "content": "\u203c CVE-2022-4666 \u203c\n\nThe Markup (JSON-LD) structured in schema.org WordPress plugin through 4.8.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-21T12:21:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/9928e792-a33c-4453-831b-82b3de3f7c02/export</guid>
      <pubDate>Tue, 21 Feb 2023 12:21:56 +0000</pubDate>
    </item>
    <item>
      <title>c860bad1-cbdc-4475-944d-1f1666c726fd</title>
      <link>https://vulnerability.circl.lu/sighting/c860bad1-cbdc-4475-944d-1f1666c726fd/export</link>
      <description>{"uuid": "c860bad1-cbdc-4475-944d-1f1666c726fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7928", "content": "#SCADA_Security\nHacking ICS Historians:\nThe Pivot Point from IT to OT  (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, CVE-2022-38469)\nhttps://claroty.com/team82/research/hacking-ics-historians-the-pivot-point-from-it-to-ot", "creation_timestamp": "2023-03-15T11:02:01.000000Z"}</description>
      <content:encoded>{"uuid": "c860bad1-cbdc-4475-944d-1f1666c726fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7928", "content": "#SCADA_Security\nHacking ICS Historians:\nThe Pivot Point from IT to OT  (CVE-2022-46732, CVE-2022-46660, CVE-2022-43494, CVE-2022-46331, CVE-2022-38469)\nhttps://claroty.com/team82/research/hacking-ics-historians-the-pivot-point-from-it-to-ot", "creation_timestamp": "2023-03-15T11:02:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/c860bad1-cbdc-4475-944d-1f1666c726fd/export</guid>
      <pubDate>Wed, 15 Mar 2023 11:02:01 +0000</pubDate>
    </item>
    <item>
      <title>820c5bd0-9806-4fd8-857c-5c6c272ff571</title>
      <link>https://vulnerability.circl.lu/sighting/820c5bd0-9806-4fd8-857c-5c6c272ff571/export</link>
      <description>{"uuid": "820c5bd0-9806-4fd8-857c-5c6c272ff571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "published-proof-of-concept", "source": "Telegram/H5Dkkha3Th8jseqkeGc7uOUCt_0lfInetyOoX5ljpqSECpk", "content": "", "creation_timestamp": "2023-03-15T13:15:26.000000Z"}</description>
      <content:encoded>{"uuid": "820c5bd0-9806-4fd8-857c-5c6c272ff571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46660", "type": "published-proof-of-concept", "source": "Telegram/H5Dkkha3Th8jseqkeGc7uOUCt_0lfInetyOoX5ljpqSECpk", "content": "", "creation_timestamp": "2023-03-15T13:15:26.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/820c5bd0-9806-4fd8-857c-5c6c272ff571/export</guid>
      <pubDate>Wed, 15 Mar 2023 13:15:26 +0000</pubDate>
    </item>
    <item>
      <title>2a5cf102-7842-4a34-bc99-d4da0c7fce37</title>
      <link>https://vulnerability.circl.lu/sighting/2a5cf102-7842-4a34-bc99-d4da0c7fce37/export</link>
      <description>{"uuid": "2a5cf102-7842-4a34-bc99-d4da0c7fce37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cultofwire/1098", "content": "ANSI Terminal security in 2023 and finding 10 CVEs.\n\n\u041a\u0440\u0443\u0442\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0442 \u0414\u044d\u0432\u0438\u0434\u0430 \u041b\u0438\u0434\u0431\u0435\u0439\u0442\u0430 \u043f\u043e \u043f\u043e\u0438\u0441\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432 \u0441 \u0430\u043a\u0446\u0435\u043d\u0442\u043e\u043c \u043d\u0430 \u041f\u041e \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u043a\u043e\u0434\u043e\u043c. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e 10 CVE \u0434\u043b\u044f \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u043e\u0432 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (Remote Code Execution, RCE), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438.\n\n\u041c\u0435\u043d\u0435\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0437\u0434\u0435\u0441\u044c: \nThe Terminal Escapes: Engineering unexpected execution from command line interfaces\n\n\u041d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 CVE \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430:\n- CVE-2022-45872 - iTerm2 DECRQSS\n- CVE-2022-44702 - Windows Terminal + WSL working directory\n- CVE-2022-47583 - mintty DECRQSS\n- CVE-2022-45063 - xterm OSC 50\n- CVE-2022-46387 - ConEmu Title\n- CVE-2023-39150 - ConEmu Title Take 2\n- CVE-2022-4170  - rxvt-unicode background\n- CVE-2022-23465 - SwiftTerm DECRQSS\n- CVE-2022-46663 - less OSC 8\n- CVE-2023-39726 - mintty OSC 50\n- CVE-2023-40359 - xterm ReGIS\n- CVE-2023-40216 - OpenBSD wscons parameter overflow", "creation_timestamp": "2023-11-08T13:02:31.000000Z"}</description>
      <content:encoded>{"uuid": "2a5cf102-7842-4a34-bc99-d4da0c7fce37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://t.me/cultofwire/1098", "content": "ANSI Terminal security in 2023 and finding 10 CVEs.\n\n\u041a\u0440\u0443\u0442\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0442 \u0414\u044d\u0432\u0438\u0434\u0430 \u041b\u0438\u0434\u0431\u0435\u0439\u0442\u0430 \u043f\u043e \u043f\u043e\u0438\u0441\u043a\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432 \u0441 \u0430\u043a\u0446\u0435\u043d\u0442\u043e\u043c \u043d\u0430 \u041f\u041e \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u043a\u043e\u0434\u043e\u043c. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e 10 CVE \u0434\u043b\u044f \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u043e\u0432 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (Remote Code Execution, RCE), \u0430 \u0442\u0430\u043a\u0436\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438.\n\n\u041c\u0435\u043d\u0435\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0447\u0438\u0442\u0430\u0442\u044c \u0437\u0434\u0435\u0441\u044c: \nThe Terminal Escapes: Engineering unexpected execution from command line interfaces\n\n\u041d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0435 CVE \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u044d\u043c\u0443\u043b\u044f\u0442\u043e\u0440\u0430\u0445 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b\u0430:\n- CVE-2022-45872 - iTerm2 DECRQSS\n- CVE-2022-44702 - Windows Terminal + WSL working directory\n- CVE-2022-47583 - mintty DECRQSS\n- CVE-2022-45063 - xterm OSC 50\n- CVE-2022-46387 - ConEmu Title\n- CVE-2023-39150 - ConEmu Title Take 2\n- CVE-2022-4170  - rxvt-unicode background\n- CVE-2022-23465 - SwiftTerm DECRQSS\n- CVE-2022-46663 - less OSC 8\n- CVE-2023-39726 - mintty OSC 50\n- CVE-2023-40359 - xterm ReGIS\n- CVE-2023-40216 - OpenBSD wscons parameter overflow", "creation_timestamp": "2023-11-08T13:02:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/2a5cf102-7842-4a34-bc99-d4da0c7fce37/export</guid>
      <pubDate>Wed, 08 Nov 2023 13:02:31 +0000</pubDate>
    </item>
    <item>
      <title>6c38d832-f0a4-4286-840c-bf9cf7b4261d</title>
      <link>https://vulnerability.circl.lu/sighting/6c38d832-f0a4-4286-840c-bf9cf7b4261d/export</link>
      <description>{"uuid": "6c38d832-f0a4-4286-840c-bf9cf7b4261d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzerudhup7f2", "content": "", "creation_timestamp": "2025-09-21T20:58:25.383143Z"}</description>
      <content:encoded>{"uuid": "6c38d832-f0a4-4286-840c-bf9cf7b4261d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-46663", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzerudhup7f2", "content": "", "creation_timestamp": "2025-09-21T20:58:25.383143Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6c38d832-f0a4-4286-840c-bf9cf7b4261d/export</guid>
      <pubDate>Sun, 21 Sep 2025 20:58:25 +0000</pubDate>
    </item>
  </channel>
</rss>
