<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 11:03:41 +0000</lastBuildDate>
    <item>
      <title>1cc5f90c-d30c-4394-a217-582161b291bd</title>
      <link>https://vulnerability.circl.lu/sighting/1cc5f90c-d30c-4394-a217-582161b291bd/export</link>
      <description>{"uuid": "1cc5f90c-d30c-4394-a217-582161b291bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4818", "type": "seen", "source": "https://t.me/cibsecurity/55513", "content": "\u203c CVE-2022-4818 \u203c\n\nA vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-29T00:12:38.000000Z"}</description>
      <content:encoded>{"uuid": "1cc5f90c-d30c-4394-a217-582161b291bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-4818", "type": "seen", "source": "https://t.me/cibsecurity/55513", "content": "\u203c CVE-2022-4818 \u203c\n\nA vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-29T00:12:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1cc5f90c-d30c-4394-a217-582161b291bd/export</guid>
      <pubDate>Thu, 29 Dec 2022 00:12:38 +0000</pubDate>
    </item>
    <item>
      <title>a058d204-33a9-42cd-9db4-6930f967e91e</title>
      <link>https://vulnerability.circl.lu/sighting/a058d204-33a9-42cd-9db4-6930f967e91e/export</link>
      <description>{"uuid": "a058d204-33a9-42cd-9db4-6930f967e91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48181", "type": "seen", "source": "https://t.me/cibsecurity/64994", "content": "\u203c CVE-2022-48181 \u203c\n\nAn ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-06T02:28:56.000000Z"}</description>
      <content:encoded>{"uuid": "a058d204-33a9-42cd-9db4-6930f967e91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48181", "type": "seen", "source": "https://t.me/cibsecurity/64994", "content": "\u203c CVE-2022-48181 \u203c\n\nAn ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-06T02:28:56.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a058d204-33a9-42cd-9db4-6930f967e91e/export</guid>
      <pubDate>Tue, 06 Jun 2023 02:28:56 +0000</pubDate>
    </item>
    <item>
      <title>a7bf5af4-f48d-4d01-bbbf-3d02570f2a77</title>
      <link>https://vulnerability.circl.lu/sighting/a7bf5af4-f48d-4d01-bbbf-3d02570f2a77/export</link>
      <description>{"uuid": "a7bf5af4-f48d-4d01-bbbf-3d02570f2a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48183", "type": "seen", "source": "https://t.me/cibsecurity/71866", "content": "\u203c CVE-2022-48183 \u203c\n\nA vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:07.000000Z"}</description>
      <content:encoded>{"uuid": "a7bf5af4-f48d-4d01-bbbf-3d02570f2a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48183", "type": "seen", "source": "https://t.me/cibsecurity/71866", "content": "\u203c CVE-2022-48183 \u203c\n\nA vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:07.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a7bf5af4-f48d-4d01-bbbf-3d02570f2a77/export</guid>
      <pubDate>Tue, 10 Oct 2023 00:16:07 +0000</pubDate>
    </item>
    <item>
      <title>e84824df-4a5b-4aea-8445-4566065c0963</title>
      <link>https://vulnerability.circl.lu/sighting/e84824df-4a5b-4aea-8445-4566065c0963/export</link>
      <description>{"uuid": "e84824df-4a5b-4aea-8445-4566065c0963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48182", "type": "seen", "source": "https://t.me/cibsecurity/71869", "content": "\u203c CVE-2022-48182 \u203c\n\nA vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:13.000000Z"}</description>
      <content:encoded>{"uuid": "e84824df-4a5b-4aea-8445-4566065c0963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48182", "type": "seen", "source": "https://t.me/cibsecurity/71869", "content": "\u203c CVE-2022-48182 \u203c\n\nA vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T00:16:13.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e84824df-4a5b-4aea-8445-4566065c0963/export</guid>
      <pubDate>Tue, 10 Oct 2023 00:16:13 +0000</pubDate>
    </item>
    <item>
      <title>f53b0461-cf8c-489f-a2b3-a5a2d2fcb222</title>
      <link>https://vulnerability.circl.lu/sighting/f53b0461-cf8c-489f-a2b3-a5a2d2fcb222/export</link>
      <description>{"uuid": "f53b0461-cf8c-489f-a2b3-a5a2d2fcb222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/717", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48181\n\ud83d\udd39 Description: An ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.\n\ud83d\udccf Published: 2023-06-05T21:01:48.880Z\n\ud83d\udccf Modified: 2025-01-08T15:55:59.489Z\n\ud83d\udd17 References:\n1. https://support.lenovo.com/us/en/product_security/LEN-124495", "creation_timestamp": "2025-01-08T16:16:54.000000Z"}</description>
      <content:encoded>{"uuid": "f53b0461-cf8c-489f-a2b3-a5a2d2fcb222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48181", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/717", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48181\n\ud83d\udd39 Description: An ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.\n\ud83d\udccf Published: 2023-06-05T21:01:48.880Z\n\ud83d\udccf Modified: 2025-01-08T15:55:59.489Z\n\ud83d\udd17 References:\n1. https://support.lenovo.com/us/en/product_security/LEN-124495", "creation_timestamp": "2025-01-08T16:16:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/f53b0461-cf8c-489f-a2b3-a5a2d2fcb222/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:16:54 +0000</pubDate>
    </item>
    <item>
      <title>0dd9fe36-eea4-4c63-8780-922314ce4a81</title>
      <link>https://vulnerability.circl.lu/sighting/0dd9fe36-eea4-4c63-8780-922314ce4a81/export</link>
      <description>{"uuid": "0dd9fe36-eea4-4c63-8780-922314ce4a81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48188", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/723", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48188\n\ud83d\udd39 Description: A buffer overflow vulnerability in the SecureBootDXE BIOS driver of some Lenovo Desktop and ThinkStation models could allow an attacker with local access to elevate their privileges to execute arbitrary code.\n\ud83d\udccf Published: 2023-06-05T21:03:07.044Z\n\ud83d\udccf Modified: 2025-01-08T15:50:42.163Z\n\ud83d\udd17 References:\n1. https://support.lenovo.com/us/en/product_security/LEN-124495", "creation_timestamp": "2025-01-08T16:19:29.000000Z"}</description>
      <content:encoded>{"uuid": "0dd9fe36-eea4-4c63-8780-922314ce4a81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-48188", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/723", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-48188\n\ud83d\udd39 Description: A buffer overflow vulnerability in the SecureBootDXE BIOS driver of some Lenovo Desktop and ThinkStation models could allow an attacker with local access to elevate their privileges to execute arbitrary code.\n\ud83d\udccf Published: 2023-06-05T21:03:07.044Z\n\ud83d\udccf Modified: 2025-01-08T15:50:42.163Z\n\ud83d\udd17 References:\n1. https://support.lenovo.com/us/en/product_security/LEN-124495", "creation_timestamp": "2025-01-08T16:19:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0dd9fe36-eea4-4c63-8780-922314ce4a81/export</guid>
      <pubDate>Wed, 08 Jan 2025 16:19:29 +0000</pubDate>
    </item>
  </channel>
</rss>
