{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/c2cciutils/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["denial-of-service","pyasn","c2cciutils","dependency-vulnerability"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe c2cciutils package, a CI utility, is susceptible to a denial-of-service (DoS) attack due to an uncontrolled recursion vulnerability within its pyasn dependency. Specifically, versions of c2cciutils prior to 1.1.65 are affected. This vulnerability, identified as CVE-2026-30922, stems from a flaw in the pyasn library (see GHSA-jr27-m4p2-rc6r) which leads to excessive resource consumption when processing certain inputs. An attacker can exploit this flaw remotely with low complexity, no…\u003c/p\u003e\n","date_modified":"2026-03-26T22:27:55Z","date_published":"2026-03-26T22:27:55Z","id":"/briefs/2026-07-c2c-ci-utils-dos/","summary":"The c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.","title":"C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)","url":"https://feed.craftedsignal.io/briefs/2026-07-c2c-ci-utils-dos/"}],"language":"en","title":"CraftedSignal Threat Feed — C2cciutils","version":"https://jsonfeed.org/version/1.1"}