<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-23T01:45:58.645237+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/18350025-61ed-4aba-a505-3366ecae8484/export</id>
    <title>18350025-61ed-4aba-a505-3366ecae8484</title>
    <updated>2026-05-23T01:45:58.989786+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "18350025-61ed-4aba-a505-3366ecae8484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/arpsyndicate/1921", "content": "#ExploitObserverAlert\n\nCVE-2022-30964\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30964. Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T05:27:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/18350025-61ed-4aba-a505-3366ecae8484/export"/>
    <published>2023-12-18T05:27:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/5efb573a-df24-4c6c-8b7e-2983a96999fc/export</id>
    <title>5efb573a-df24-4c6c-8b7e-2983a96999fc</title>
    <updated>2026-05-23T01:45:58.989727+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "5efb573a-df24-4c6c-8b7e-2983a96999fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30965", "type": "seen", "source": "https://t.me/arpsyndicate/1950", "content": "#ExploitObserverAlert\n\nCVE-2022-30965\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30965. Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T08:54:52.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/5efb573a-df24-4c6c-8b7e-2983a96999fc/export"/>
    <published>2023-12-18T08:54:52+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/dea218bd-0bc2-4454-b8aa-6c5434da6992/export</id>
    <title>dea218bd-0bc2-4454-b8aa-6c5434da6992</title>
    <updated>2026-05-23T01:45:58.989671+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "dea218bd-0bc2-4454-b8aa-6c5434da6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://t.me/arpsyndicate/1970", "content": "#ExploitObserverAlert\n\nCVE-2022-30967\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30967. Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T11:06:17.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/dea218bd-0bc2-4454-b8aa-6c5434da6992/export"/>
    <published>2023-12-18T11:06:17+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/df16bd11-25c0-413b-a2ee-7f3dd5f80ee0/export</id>
    <title>df16bd11-25c0-413b-a2ee-7f3dd5f80ee0</title>
    <updated>2026-05-23T01:45:58.989614+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "df16bd11-25c0-413b-a2ee-7f3dd5f80ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/arpsyndicate/1982", "content": "#ExploitObserverAlert\n\nCVE-2022-30966\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30966. Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T12:28:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/df16bd11-25c0-413b-a2ee-7f3dd5f80ee0/export"/>
    <published>2023-12-18T12:28:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17/export</id>
    <title>bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17</title>
    <updated>2026-05-23T01:45:58.989553+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.\n\ud83d\udccf Published: 2022-10-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T15:46:38.482Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d", "creation_timestamp": "2025-05-06T16:22:05.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17/export"/>
    <published>2025-05-06T16:22:05+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/d760a0e9-851d-4284-8c98-316cf5baa952/export</id>
    <title>d760a0e9-851d-4284-8c98-316cf5baa952</title>
    <updated>2026-05-23T01:45:58.989500+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "d760a0e9-851d-4284-8c98-316cf5baa952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4rsc7akb7x2", "content": "", "creation_timestamp": "2025-11-04T05:26:06.000060Z"}</content>
    <link href="https://db.gcve.eu/sighting/d760a0e9-851d-4284-8c98-316cf5baa952/export"/>
    <published>2025-11-04T05:26:06.000060+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/06710e58-5765-48c2-8d43-538091fe03f9/export</id>
    <title>06710e58-5765-48c2-8d43-538091fe03f9</title>
    <updated>2026-05-23T01:45:58.989447+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "06710e58-5765-48c2-8d43-538091fe03f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4v23eqhkgw2", "content": "", "creation_timestamp": "2025-11-05T12:23:33.998454Z"}</content>
    <link href="https://db.gcve.eu/sighting/06710e58-5765-48c2-8d43-538091fe03f9/export"/>
    <published>2025-11-05T12:23:33.998454+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1d82e07d-7749-4f4a-8647-cb9b906f1444/export</id>
    <title>1d82e07d-7749-4f4a-8647-cb9b906f1444</title>
    <updated>2026-05-23T01:45:58.989390+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1d82e07d-7749-4f4a-8647-cb9b906f1444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3m4wvrrgqt3d2", "content": "", "creation_timestamp": "2025-11-06T06:11:39.349677Z"}</content>
    <link href="https://db.gcve.eu/sighting/1d82e07d-7749-4f4a-8647-cb9b906f1444/export"/>
    <published>2025-11-06T06:11:39.349677+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b446f7a4-cc6f-4649-949c-58f5207cb3ef/export</id>
    <title>b446f7a4-cc6f-4649-949c-58f5207cb3ef</title>
    <updated>2026-05-23T01:45:58.989302+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b446f7a4-cc6f-4649-949c-58f5207cb3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3m4wvs4btns2r", "content": "", "creation_timestamp": "2025-11-06T06:11:40.140905Z"}</content>
    <link href="https://db.gcve.eu/sighting/b446f7a4-cc6f-4649-949c-58f5207cb3ef/export"/>
    <published>2025-11-06T06:11:40.140905+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/b7a53ffd-a709-4fed-943c-7cc0ae73bad1/export</id>
    <title>b7a53ffd-a709-4fed-943c-7cc0ae73bad1</title>
    <updated>2026-05-23T01:45:58.987913+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "b7a53ffd-a709-4fed-943c-7cc0ae73bad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4yscmia6ii2", "content": "", "creation_timestamp": "2025-11-07T00:14:53.105543Z"}</content>
    <link href="https://db.gcve.eu/sighting/b7a53ffd-a709-4fed-943c-7cc0ae73bad1/export"/>
    <published>2025-11-07T00:14:53.105543+00:00</published>
  </entry>
</feed>
