<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 23 May 2026 01:45:58 +0000</lastBuildDate>
    <item>
      <title>18350025-61ed-4aba-a505-3366ecae8484</title>
      <link>https://db.gcve.eu/sighting/18350025-61ed-4aba-a505-3366ecae8484/export</link>
      <description>{"uuid": "18350025-61ed-4aba-a505-3366ecae8484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/arpsyndicate/1921", "content": "#ExploitObserverAlert\n\nCVE-2022-30964\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30964. Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T05:27:39.000000Z"}</description>
      <content:encoded>{"uuid": "18350025-61ed-4aba-a505-3366ecae8484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/arpsyndicate/1921", "content": "#ExploitObserverAlert\n\nCVE-2022-30964\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30964. Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T05:27:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/18350025-61ed-4aba-a505-3366ecae8484/export</guid>
      <pubDate>Mon, 18 Dec 2023 05:27:39 +0000</pubDate>
    </item>
    <item>
      <title>5efb573a-df24-4c6c-8b7e-2983a96999fc</title>
      <link>https://db.gcve.eu/sighting/5efb573a-df24-4c6c-8b7e-2983a96999fc/export</link>
      <description>{"uuid": "5efb573a-df24-4c6c-8b7e-2983a96999fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30965", "type": "seen", "source": "https://t.me/arpsyndicate/1950", "content": "#ExploitObserverAlert\n\nCVE-2022-30965\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30965. Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T08:54:52.000000Z"}</description>
      <content:encoded>{"uuid": "5efb573a-df24-4c6c-8b7e-2983a96999fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30965", "type": "seen", "source": "https://t.me/arpsyndicate/1950", "content": "#ExploitObserverAlert\n\nCVE-2022-30965\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30965. Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T08:54:52.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5efb573a-df24-4c6c-8b7e-2983a96999fc/export</guid>
      <pubDate>Mon, 18 Dec 2023 08:54:52 +0000</pubDate>
    </item>
    <item>
      <title>dea218bd-0bc2-4454-b8aa-6c5434da6992</title>
      <link>https://db.gcve.eu/sighting/dea218bd-0bc2-4454-b8aa-6c5434da6992/export</link>
      <description>{"uuid": "dea218bd-0bc2-4454-b8aa-6c5434da6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://t.me/arpsyndicate/1970", "content": "#ExploitObserverAlert\n\nCVE-2022-30967\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30967. Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T11:06:17.000000Z"}</description>
      <content:encoded>{"uuid": "dea218bd-0bc2-4454-b8aa-6c5434da6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://t.me/arpsyndicate/1970", "content": "#ExploitObserverAlert\n\nCVE-2022-30967\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30967. Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T11:06:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dea218bd-0bc2-4454-b8aa-6c5434da6992/export</guid>
      <pubDate>Mon, 18 Dec 2023 11:06:17 +0000</pubDate>
    </item>
    <item>
      <title>df16bd11-25c0-413b-a2ee-7f3dd5f80ee0</title>
      <link>https://db.gcve.eu/sighting/df16bd11-25c0-413b-a2ee-7f3dd5f80ee0/export</link>
      <description>{"uuid": "df16bd11-25c0-413b-a2ee-7f3dd5f80ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/arpsyndicate/1982", "content": "#ExploitObserverAlert\n\nCVE-2022-30966\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30966. Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T12:28:01.000000Z"}</description>
      <content:encoded>{"uuid": "df16bd11-25c0-413b-a2ee-7f3dd5f80ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/arpsyndicate/1982", "content": "#ExploitObserverAlert\n\nCVE-2022-30966\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30966. Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T12:28:01.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/df16bd11-25c0-413b-a2ee-7f3dd5f80ee0/export</guid>
      <pubDate>Mon, 18 Dec 2023 12:28:01 +0000</pubDate>
    </item>
    <item>
      <title>bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17</title>
      <link>https://db.gcve.eu/sighting/bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17/export</link>
      <description>{"uuid": "bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.\n\ud83d\udccf Published: 2022-10-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T15:46:38.482Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d", "creation_timestamp": "2025-05-06T16:22:05.000000Z"}</description>
      <content:encoded>{"uuid": "bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.\n\ud83d\udccf Published: 2022-10-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T15:46:38.482Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d", "creation_timestamp": "2025-05-06T16:22:05.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17/export</guid>
      <pubDate>Tue, 06 May 2025 16:22:05 +0000</pubDate>
    </item>
    <item>
      <title>d760a0e9-851d-4284-8c98-316cf5baa952</title>
      <link>https://db.gcve.eu/sighting/d760a0e9-851d-4284-8c98-316cf5baa952/export</link>
      <description>{"uuid": "d760a0e9-851d-4284-8c98-316cf5baa952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4rsc7akb7x2", "content": "", "creation_timestamp": "2025-11-04T05:26:06.000060Z"}</description>
      <content:encoded>{"uuid": "d760a0e9-851d-4284-8c98-316cf5baa952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4rsc7akb7x2", "content": "", "creation_timestamp": "2025-11-04T05:26:06.000060Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d760a0e9-851d-4284-8c98-316cf5baa952/export</guid>
      <pubDate>Tue, 04 Nov 2025 05:26:06 +0000</pubDate>
    </item>
    <item>
      <title>06710e58-5765-48c2-8d43-538091fe03f9</title>
      <link>https://db.gcve.eu/sighting/06710e58-5765-48c2-8d43-538091fe03f9/export</link>
      <description>{"uuid": "06710e58-5765-48c2-8d43-538091fe03f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4v23eqhkgw2", "content": "", "creation_timestamp": "2025-11-05T12:23:33.998454Z"}</description>
      <content:encoded>{"uuid": "06710e58-5765-48c2-8d43-538091fe03f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4v23eqhkgw2", "content": "", "creation_timestamp": "2025-11-05T12:23:33.998454Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/06710e58-5765-48c2-8d43-538091fe03f9/export</guid>
      <pubDate>Wed, 05 Nov 2025 12:23:33 +0000</pubDate>
    </item>
    <item>
      <title>1d82e07d-7749-4f4a-8647-cb9b906f1444</title>
      <link>https://db.gcve.eu/sighting/1d82e07d-7749-4f4a-8647-cb9b906f1444/export</link>
      <description>{"uuid": "1d82e07d-7749-4f4a-8647-cb9b906f1444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3m4wvrrgqt3d2", "content": "", "creation_timestamp": "2025-11-06T06:11:39.349677Z"}</description>
      <content:encoded>{"uuid": "1d82e07d-7749-4f4a-8647-cb9b906f1444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3m4wvrrgqt3d2", "content": "", "creation_timestamp": "2025-11-06T06:11:39.349677Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1d82e07d-7749-4f4a-8647-cb9b906f1444/export</guid>
      <pubDate>Thu, 06 Nov 2025 06:11:39 +0000</pubDate>
    </item>
    <item>
      <title>b446f7a4-cc6f-4649-949c-58f5207cb3ef</title>
      <link>https://db.gcve.eu/sighting/b446f7a4-cc6f-4649-949c-58f5207cb3ef/export</link>
      <description>{"uuid": "b446f7a4-cc6f-4649-949c-58f5207cb3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3m4wvs4btns2r", "content": "", "creation_timestamp": "2025-11-06T06:11:40.140905Z"}</description>
      <content:encoded>{"uuid": "b446f7a4-cc6f-4649-949c-58f5207cb3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3m4wvs4btns2r", "content": "", "creation_timestamp": "2025-11-06T06:11:40.140905Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b446f7a4-cc6f-4649-949c-58f5207cb3ef/export</guid>
      <pubDate>Thu, 06 Nov 2025 06:11:40 +0000</pubDate>
    </item>
    <item>
      <title>b7a53ffd-a709-4fed-943c-7cc0ae73bad1</title>
      <link>https://db.gcve.eu/sighting/b7a53ffd-a709-4fed-943c-7cc0ae73bad1/export</link>
      <description>{"uuid": "b7a53ffd-a709-4fed-943c-7cc0ae73bad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4yscmia6ii2", "content": "", "creation_timestamp": "2025-11-07T00:14:53.105543Z"}</description>
      <content:encoded>{"uuid": "b7a53ffd-a709-4fed-943c-7cc0ae73bad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4yscmia6ii2", "content": "", "creation_timestamp": "2025-11-07T00:14:53.105543Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/b7a53ffd-a709-4fed-943c-7cc0ae73bad1/export</guid>
      <pubDate>Fri, 07 Nov 2025 00:14:53 +0000</pubDate>
    </item>
  </channel>
</rss>
