{"uuid": "460e628b-aef2-4651-adad-fbfdc81b46c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48303", "type": "seen", "source": "https://t.me/arpsyndicate/2029", "content": "#ExploitObserverAlert\n\nCVE-2022-48303\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2022-48303. GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 3.6\nNVD-ES: 1.8", "creation_timestamp": "2023-12-18T17:09:42.000000Z"}