{"vulnerability": "CVE-2025-3019", "sightings": [{"uuid": "bce770c2-182c-41ed-bc5c-62c9c1eb1ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30197", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnc2kyp2n", "content": "", "creation_timestamp": "2025-03-19T18:43:46.945645Z"}, {"uuid": "e7fc5541-bf3f-4efd-841a-e5f29d4b88e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30196", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkqtnciajz26", "content": "", "creation_timestamp": "2025-03-19T18:43:49.573696Z"}, {"uuid": "6ffb26b7-f57d-4c7f-b4b5-795024381f93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lmgypdoj6s2j", "content": "", "creation_timestamp": "2025-04-10T07:38:06.887744Z"}, {"uuid": "dd1be515-5bf2-42e7-8fee-9ff586d57d20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3019", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3llzoosmwa22g", "content": "", "creation_timestamp": "2025-04-05T00:34:16.624025Z"}, {"uuid": "62fc1ff2-6750-4de2-abd2-b404f0e2c07b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30193", "type": "seen", "source": "https://bsky.app/profile/powerdns.bsky.social/post/3lplxoi5dlk2e", "content": "", "creation_timestamp": "2025-05-20T11:18:38.843868Z"}, {"uuid": "8a96c7c9-d838-4fdd-965f-d58d73d4cf90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmjrkgyoi22m", "content": "", "creation_timestamp": "2025-04-11T10:08:06.892486Z"}, {"uuid": "3306e29f-f777-4d8d-8fa2-231ee2e48da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lmgacwg34k27", "content": "", "creation_timestamp": "2025-04-10T00:21:41.547424Z"}, {"uuid": "62aaee07-2ab9-4adc-8907-fcb432eba5a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30193", "type": "seen", "source": "https://bsky.app/profile/powerdns.bsky.social/post/3lplxozplrk2e", "content": "", "creation_timestamp": "2025-05-20T11:18:55.690523Z"}, {"uuid": "d769e84c-9699-490f-89bd-051d7cb9ab21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3lnxbcsaqns2u", "content": "", "creation_timestamp": "2025-04-29T12:19:58.144638Z"}, {"uuid": "5af3df65-0c40-49a8-9e23-7a3e838cd1a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-30194", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lnz3lrn24c24", "content": "", "creation_timestamp": "2025-04-30T05:43:00.197308Z"}, {"uuid": "17269002-1429-40c2-90c9-2cacd86546e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lnznq6ojw22p", "content": "", "creation_timestamp": "2025-04-30T11:07:32.633131Z"}, {"uuid": "3ce80b62-2efc-47c2-9d5f-139748731438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:40.000000Z"}, {"uuid": "7aa8b039-5512-4501-8da6-3fcb17bc6573", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/102", "content": "", "creation_timestamp": "2025-04-29T09:41:46.000000Z"}, {"uuid": "012739b2-1ef4-4dee-b083-66dc0a7b8734", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30198", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-19", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "693fb752-c78b-4ef7-9539-74352d674103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30199", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-135-19", "content": "", "creation_timestamp": "2025-05-15T10:00:00.000000Z"}, {"uuid": "28dff6c5-0214-43d0-ad5c-5df37c3e0baf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30192", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lvbyvq3vbc2c", "content": "", "creation_timestamp": "2025-07-31T20:45:07.916662Z"}, {"uuid": "cdc34090-c81f-4207-b42a-0a9339d172d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:38.000000Z"}, {"uuid": "fd8f2bfe-8cc6-4e4f-b554-aa23e294d03a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30197", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:27.000000Z"}, {"uuid": "8c82a73f-408e-4793-bb7e-3098506434ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30196", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "04b627bf-79c4-450a-aca1-bd6a6fec9112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30197", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "d4ef9616-e934-446d-a98f-3ccf9158dd66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30196", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "ddac7e76-b045-4207-9d91-46a01d595d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30191", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4ibgqq7v426", "content": "", "creation_timestamp": "2025-10-31T10:30:07.749065Z"}, {"uuid": "270f9506-8d99-45b2-ab64-1d694db87046", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13803", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30194\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.\n\nThe remedy is: upgrade to the patched 1.9.9 version.\n\nA workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.\n\nWe would like to thank Charles Howes for bringing this issue to our attention.\n\ud83d\udccf Published: 2025-04-29T11:25:47.141Z\n\ud83d\udccf Modified: 2025-04-29T11:27:04.926Z\n\ud83d\udd17 References:\n1. https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-02.html", "creation_timestamp": "2025-04-29T12:12:36.000000Z"}, {"uuid": "582ac45b-9969-47de-b778-02603174df42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30190", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m6metaayar2u", "content": "", "creation_timestamp": "2025-11-27T12:31:49.930827Z"}, {"uuid": "614c5cd4-fe31-462c-97a1-2dd6e4b7585a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3019", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9608", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3019\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/AU:Y/R:U/V:D/RE:M/U:Amber)\n\ud83d\udd39 Description: KNIME Business Hub is affected by several cross-site scripting vulnerabilities in its web pages. If a user clicks on a malicious link or opens a malicious web page, arbitrary Java Script may be executed with this user's permissions. This can lead to information loss and/or modification of existing data.\nThe issues are caused by a  bug https://github.com/Baroshem/nuxt-security/issues/610  in the widely used nuxt-security module.\n\n\n\n\n\nThere are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub:\n\n\n\n\n\n  *  1.13.3 or later\n\n\n\n\n\n\n  *  1.12.4 or later\n\ud83d\udccf Published: 2025-03-31T06:49:34.073Z\n\ud83d\udccf Modified: 2025-03-31T06:49:34.073Z\n\ud83d\udd17 References:\n1. https://www.knime.com/security/advisories#CVE-2025-3019", "creation_timestamp": "2025-03-31T07:30:38.000000Z"}, {"uuid": "57851746-bbd2-4cd7-a321-d51eb1b39164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30197", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8334", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30197\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Jenkins Zoho QEngine Plugin 1.0.29.vfa_cc23396502 and earlier does not mask the QEngine API Key form field, increasing the potential for attackers to observe and capture it.\n\ud83d\udccf Published: 2025-03-19T15:38:13.360Z\n\ud83d\udccf Modified: 2025-03-21T14:08:19.969Z\n\ud83d\udd17 References:\n1. https://www.jenkins.io/security/advisory/2025-03-19/#SECURITY-3511", "creation_timestamp": "2025-03-21T14:19:05.000000Z"}, {"uuid": "c440fc7a-5908-4ee9-abfb-bd4bdc1ac905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10699", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30195\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.\n\nThe remedy is: upgrade to the patched 5.2.1 version.\n\nWe would like to thank Volodymyr Ilyin for bringing this issue to our attention.\n\ud83d\udccf Published: 2025-04-07T13:24:17.879Z\n\ud83d\udccf Modified: 2025-04-07T13:24:17.879Z\n\ud83d\udd17 References:\n1. https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-01.html", "creation_timestamp": "2025-04-07T13:45:22.000000Z"}, {"uuid": "3afa53a9-9d48-498b-83fb-82b83967b6b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "https://t.me/cvedetector/22307", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30195 - PowerDNS Recursor DNS Cache Poisoning Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-30195 \nPublished : April 7, 2025, 2:15 p.m. | 23\u00a0minutes ago \nDescription : An attacker can publish a zone containing specific Resource Record Sets. Processing and caching results for these sets can lead to an illegal memory accesses and crash of the Recursor, causing a denial of service.  \n  \nThe remedy is: upgrade to the patched 5.2.1 version.  \n  \nWe would like to thank Volodymyr Ilyin for bringing this issue to our attention. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T17:04:10.000000Z"}, {"uuid": "b9621020-8b8a-4518-bad4-9698ed37b5c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30193", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16966", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30193\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: In some circumstances, when DNSdist is configured to allow an unlimited number of queries on a single, incoming TCP connection from a client, an attacker can cause a denial of service by crafting a TCP exchange that triggers an exhaustion of the stack and a crash of DNSdist, causing a denial of service.\n\nThe remedy is: upgrade to the patched 1.9.10 version.\n\nA workaround is to restrict the maximum number of queries on incoming TCP connections to a safe value, like 50, via the setMaxTCPQueriesPerConnection setting.\n\nWe would like to thank Renaud Allard for bringing this issue to our attention.\n\ud83d\udccf Published: 2025-05-20T11:17:17.378Z\n\ud83d\udccf Modified: 2025-05-20T11:17:17.378Z\n\ud83d\udd17 References:\n1. https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-03.html", "creation_timestamp": "2025-05-20T11:40:19.000000Z"}, {"uuid": "3525274b-9b8e-4155-81d2-01594b3e94aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "https://t.me/cvedetector/23992", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30194 - DNSdist DoH Double-Free Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-30194 \nPublished : April 29, 2025, 12:15 p.m. | 17\u00a0minutes ago \nDescription : When DNSdist is configured to provide DoH via the nghttp2 provider, an attacker can cause a denial of service by crafting a DoH exchange that triggers an illegal memory access (double-free) and crash of DNSdist, causing a denial of service.  \n  \nThe remedy is: upgrade to the patched 1.9.9 version.  \n  \nA workaround is to temporarily switch to the h2o provider until DNSdist has been upgraded to a fixed version.  \n  \nWe would like to thank Charles Howes for bringing this issue to our attention. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-29T15:09:26.000000Z"}, {"uuid": "8cbb0438-ed5c-40d5-a9fe-5743c206efa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3019", "type": "seen", "source": "https://t.me/cvedetector/21564", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3019 - KNIME Business Hub Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3019 \nPublished : March 31, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : KNIME Business Hub is affected by several cross-site scripting vulnerabilities in its web pages. If a user clicks on a malicious link or opens a malicious web page, arbitrary Java Script may be executed with this user's permissions. This can lead to information loss and/or modification of existing data.  \nThe issues are caused by a  bug   in the widely used nuxt-security module.  \n  \n  \n  \n  \n  \nThere are no viable workarounds therefore we strongly recommend to update to one of the following versions of KNIME Business Hub:  \n  \n  \n  \n  \n  \n  *  1.13.3 or later  \n  \n  \n  \n  \n  \n  \n  *  1.12.4 or later \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T10:49:39.000000Z"}, {"uuid": "5e0b3f93-f7a6-43cd-a3b3-01545284aa89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30194", "type": "seen", "source": "Telegram/cGJ944CXyeffrtXPIenZS-eFnFpysOqeEVOOEo7Bip4pVr0", "content": "", "creation_timestamp": "2025-04-29T14:00:48.000000Z"}, {"uuid": "2f3e236b-1626-4c0e-a114-936aacd1b60e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30196", "type": "seen", "source": "https://t.me/cvedetector/20641", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30196 - Jenkins AnchorChain Plugin Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-30196 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Jenkins AnchorChain Plugin 1.0 does not limit URL schemes for links it creates based on workspace content, allowing the `javascript:` scheme, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control the input file for the Anchor Chain post-build step. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:15.000000Z"}, {"uuid": "376398e6-c5e6-4249-9696-ffb84c43925c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30197", "type": "seen", "source": "https://t.me/cvedetector/20640", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30197 - Jenkins Zoho QEngine Plugin Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-30197 \nPublished : March 19, 2025, 4:15 p.m. | 1\u00a0hour, 11\u00a0minutes ago \nDescription : Jenkins Zoho QEngine Plugin 1.0.29.vfa_cc23396502 and earlier does not mask the QEngine API Key form field, increasing the potential for attackers to observe and capture it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T18:49:14.000000Z"}, {"uuid": "70172e66-125c-44e8-8dd1-a8ffcbd76c69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30195", "type": "seen", "source": "Telegram/9WeVqmxpJnSrOwEG-5fjokMdn-PcsSdinke_YdNeQEZfFSQ", "content": "", "creation_timestamp": "2025-04-07T16:30:15.000000Z"}]}