{"uuid": "18350025-61ed-4aba-a505-3366ecae8484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/arpsyndicate/1921", "content": "#ExploitObserverAlert\n\nCVE-2022-30964\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30964. Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T05:27:39.000000Z"}