<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 13:08:48 +0000</lastBuildDate>
    <item>
      <title>468fc7f7-8b42-4eaa-a20b-b5f34e08f4e5</title>
      <link>https://vulnerability.circl.lu/sighting/468fc7f7-8b42-4eaa-a20b-b5f34e08f4e5/export</link>
      <description>{"uuid": "468fc7f7-8b42-4eaa-a20b-b5f34e08f4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27889", "type": "seen", "source": "https://t.me/cibsecurity/44406", "content": "\u203c CVE-2022-27889 \u203c\n\nThe Multipass service was found to have code paths that could be abused to cause a denial of service for authentication or authorization operations. A malicious attacker could perform an application-level denial of service attack, potentially causing authentication and/or authorization operations to fail for the duration of the attack. This could lead to performance degradation or login failures for customer Palantir Foundry environments. This vulnerability is resolved in Multipass 3.647.0. This issue affects: Palantir Foundry Multipass versions prior to 3.647.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T18:23:56.000000Z"}</description>
      <content:encoded>{"uuid": "468fc7f7-8b42-4eaa-a20b-b5f34e08f4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-27889", "type": "seen", "source": "https://t.me/cibsecurity/44406", "content": "\u203c CVE-2022-27889 \u203c\n\nThe Multipass service was found to have code paths that could be abused to cause a denial of service for authentication or authorization operations. A malicious attacker could perform an application-level denial of service attack, potentially causing authentication and/or authorization operations to fail for the duration of the attack. This could lead to performance degradation or login failures for customer Palantir Foundry environments. This vulnerability is resolved in Multipass 3.647.0. This issue affects: Palantir Foundry Multipass versions prior to 3.647.0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-14T18:23:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/468fc7f7-8b42-4eaa-a20b-b5f34e08f4e5/export</guid>
      <pubDate>Tue, 14 Jun 2022 18:23:56 +0000</pubDate>
    </item>
  </channel>
</rss>
