{"uuid": "df16bd11-25c0-413b-a2ee-7f3dd5f80ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/arpsyndicate/1982", "content": "#ExploitObserverAlert\n\nCVE-2022-30966\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30966. Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T12:28:01.000000Z"}