<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 21:54:16 +0000</lastBuildDate>
    <item>
      <title>b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3</title>
      <link>https://vulnerability.circl.lu/sighting/b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3/export</link>
      <description>{"uuid": "b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48217", "type": "seen", "source": "https://t.me/cibsecurity/55914", "content": "\u203c CVE-2022-48217 \u203c\n\n** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is \"it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not.\"\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T22:18:14.000000Z"}</description>
      <content:encoded>{"uuid": "b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48217", "type": "seen", "source": "https://t.me/cibsecurity/55914", "content": "\u203c CVE-2022-48217 \u203c\n\n** DISPUTED ** The tf_remapper_node component 1.1.1 for Robot Operating System (ROS) allows attackers, who control the source code of a different node in the same ROS application, to change a robot's behavior. This occurs because a topic name depends on the attacker-controlled old_tf_topic_name and/or new_tf_topic_name parameter. NOTE: the vendor's position is \"it is the responsibility of the programmer to make sure that only known and required parameters are set and unexpected parameters are not.\"\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-04T22:18:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b24ff1b9-1b9f-49fe-b19d-ac1f585b01a3/export</guid>
      <pubDate>Wed, 04 Jan 2023 22:18:14 +0000</pubDate>
    </item>
  </channel>
</rss>
