{"uuid": "f31e59d5-a893-48ca-bbc4-c73f66f1dfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-45145", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13030", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-45145\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file.\n\ud83d\udccf Published: 2022-12-10T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-23T13:54:51.643Z\n\ud83d\udd17 References:\n1. https://lists.gnu.org/archive/html/chicken-announce/2022-11/msg00000.html\n2. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=egg-compile.scm%3Bh=9ba4568113350ec75204cba55e43e27925e2d6fe%3Bhp=c1f2ceb0fb470f63c2ba2a1cf9d8d40083c2359f%3Bhb=a08f8f548d772ef410c672ba33a27108d8d434f3%3Bhpb=9c6fb001c25de4390f46ffd7c3c94237f4df92a9\n3. https://code.call-cc.org/cgi-bin/gitweb.cgi?p=chicken-core.git%3Ba=blobdiff%3Bf=NEWS%3Bh=54888afff09353093453673c407cabfe76a5ce77%3Bhp=a3fd88a892f82c8353267f50509d018bbb1934b9%3Bhb=670478435a982fc4d1f001ea08669f53d35a51cd%3Bhpb=a08f8f548d772ef410c672ba33a27108d8d434f3", "creation_timestamp": "2025-04-23T14:05:04.000000Z"}