<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Tue, 05 May 2026 19:44:23 +0000</lastBuildDate>
    <item>
      <title>cc1058c3-1dd0-4846-a5eb-a21141ba3219</title>
      <link>https://db.gcve.eu/sighting/cc1058c3-1dd0-4846-a5eb-a21141ba3219/export</link>
      <description>{"uuid": "cc1058c3-1dd0-4846-a5eb-a21141ba3219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "seen", "source": "https://t.me/cibsecurity/42712", "content": "\u203c CVE-2022-30778 \u203c\n\nLaravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in __destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-16T07:25:57.000000Z"}</description>
      <content:encoded>{"uuid": "cc1058c3-1dd0-4846-a5eb-a21141ba3219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "seen", "source": "https://t.me/cibsecurity/42712", "content": "\u203c CVE-2022-30778 \u203c\n\nLaravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain in __destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-16T07:25:57.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/cc1058c3-1dd0-4846-a5eb-a21141ba3219/export</guid>
      <pubDate>Mon, 16 May 2022 07:25:57 +0000</pubDate>
    </item>
    <item>
      <title>b79276f3-5947-4925-9af7-cb4d53d75047</title>
      <link>https://db.gcve.eu/sighting/b79276f3-5947-4925-9af7-cb4d53d75047/export</link>
      <description>{"uuid": "b79276f3-5947-4925-9af7-cb4d53d75047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2265", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCase for CVE-2022-30778\nURL\uff1ahttps://github.com/kang8/CVE-2022-30778\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-23T07:09:27.000000Z"}</description>
      <content:encoded>{"uuid": "b79276f3-5947-4925-9af7-cb4d53d75047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2265", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCase for CVE-2022-30778\nURL\uff1ahttps://github.com/kang8/CVE-2022-30778\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-05-23T07:09:27.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b79276f3-5947-4925-9af7-cb4d53d75047/export</guid>
      <pubDate>Mon, 23 May 2022 07:09:27 +0000</pubDate>
    </item>
    <item>
      <title>3a251cbf-c6d2-45cd-b477-4964f9c27417</title>
      <link>https://db.gcve.eu/sighting/3a251cbf-c6d2-45cd-b477-4964f9c27417/export</link>
      <description>{"uuid": "3a251cbf-c6d2-45cd-b477-4964f9c27417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "Telegram/75xPQErj_o1BxNCA0_YwJS-cOOLVtcfr457jOo5lMd5EYw", "content": "", "creation_timestamp": "2022-05-23T14:07:05.000000Z"}</description>
      <content:encoded>{"uuid": "3a251cbf-c6d2-45cd-b477-4964f9c27417", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "Telegram/75xPQErj_o1BxNCA0_YwJS-cOOLVtcfr457jOo5lMd5EYw", "content": "", "creation_timestamp": "2022-05-23T14:07:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/3a251cbf-c6d2-45cd-b477-4964f9c27417/export</guid>
      <pubDate>Mon, 23 May 2022 14:07:05 +0000</pubDate>
    </item>
    <item>
      <title>d0296582-9881-4984-9209-05d7e3520e22</title>
      <link>https://db.gcve.eu/sighting/d0296582-9881-4984-9209-05d7e3520e22/export</link>
      <description>{"uuid": "d0296582-9881-4984-9209-05d7e3520e22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/168", "content": "CVE-2022-30778 : Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain  \n__destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php\n\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-23T18:44:38.000000Z"}</description>
      <content:encoded>{"uuid": "d0296582-9881-4984-9209-05d7e3520e22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/168", "content": "CVE-2022-30778 : Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution via an unserialize pop chain  \n__destruct in Illuminate\\Broadcasting\\PendingBroadcast.php and dispatch($command) in Illuminate\\Bus\\QueueingDispatcher.php\n\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-23T18:44:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d0296582-9881-4984-9209-05d7e3520e22/export</guid>
      <pubDate>Mon, 23 May 2022 18:44:38 +0000</pubDate>
    </item>
    <item>
      <title>1d1c83ae-f412-4f39-bc80-b0ce7817d857</title>
      <link>https://db.gcve.eu/sighting/1d1c83ae-f412-4f39-bc80-b0ce7817d857/export</link>
      <description>{"uuid": "1d1c83ae-f412-4f39-bc80-b0ce7817d857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2096", "content": "#CVE-2022\n\nCase for CVE-2022-30778\n\nhttps://github.com/kang8/CVE-2022-30778\n\n@BlueRedTeam", "creation_timestamp": "2022-05-23T18:58:29.000000Z"}</description>
      <content:encoded>{"uuid": "1d1c83ae-f412-4f39-bc80-b0ce7817d857", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2096", "content": "#CVE-2022\n\nCase for CVE-2022-30778\n\nhttps://github.com/kang8/CVE-2022-30778\n\n@BlueRedTeam", "creation_timestamp": "2022-05-23T18:58:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d1c83ae-f412-4f39-bc80-b0ce7817d857/export</guid>
      <pubDate>Mon, 23 May 2022 18:58:29 +0000</pubDate>
    </item>
    <item>
      <title>94c0490e-2778-4dff-8294-5669d470e2e7</title>
      <link>https://db.gcve.eu/sighting/94c0490e-2778-4dff-8294-5669d470e2e7/export</link>
      <description>{"uuid": "94c0490e-2778-4dff-8294-5669d470e2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6069", "content": "#exploit\n1. CVE-2022-1292:\nOpenSSL - OS Command Injection\nhttps://github.com/li8u99/CVE-2022-1292\n\n2. CVE-2022-30778:\nLaravel 9.1.8 - RCE\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-25T11:03:01.000000Z"}</description>
      <content:encoded>{"uuid": "94c0490e-2778-4dff-8294-5669d470e2e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30778", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/6069", "content": "#exploit\n1. CVE-2022-1292:\nOpenSSL - OS Command Injection\nhttps://github.com/li8u99/CVE-2022-1292\n\n2. CVE-2022-30778:\nLaravel 9.1.8 - RCE\nhttps://github.com/kang8/CVE-2022-30778", "creation_timestamp": "2022-05-25T11:03:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/94c0490e-2778-4dff-8294-5669d470e2e7/export</guid>
      <pubDate>Wed, 25 May 2022 11:03:01 +0000</pubDate>
    </item>
  </channel>
</rss>
