{"vulnerability": "cve-2022-3096", "sightings": [{"uuid": "b7a53ffd-a709-4fed-943c-7cc0ae73bad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4yscmia6ii2", "content": "", "creation_timestamp": "2025-11-07T00:14:53.105543Z"}, {"uuid": "06710e58-5765-48c2-8d43-538091fe03f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4v23eqhkgw2", "content": "", "creation_timestamp": "2025-11-05T12:23:33.998454Z"}, {"uuid": "dea218bd-0bc2-4454-b8aa-6c5434da6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://t.me/arpsyndicate/1970", "content": "#ExploitObserverAlert\n\nCVE-2022-30967\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30967. Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T11:06:17.000000Z"}, {"uuid": "5efb573a-df24-4c6c-8b7e-2983a96999fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30965", "type": "seen", "source": "https://t.me/arpsyndicate/1950", "content": "#ExploitObserverAlert\n\nCVE-2022-30965\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30965. Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T08:54:52.000000Z"}, {"uuid": "05b9a75b-f4f9-4dcb-b486-de7c508d1f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30961", "type": "seen", "source": "https://t.me/cibsecurity/42809", "content": "\u203c CVE-2022-30961 \u203c\n\nJenkins Autocomplete Parameter Plugin 1.1 and earlier does not escape the name of Dropdown Autocomplete and Auto Complete String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:33.000000Z"}, {"uuid": "44ce90b9-5c9f-43b4-8f1f-acc73ce261a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://t.me/cibsecurity/42811", "content": "\u203c CVE-2022-30963 \u203c\n\nJenkins JDK Parameter Plugin 1.0 and earlier does not escape the name and description of JDK parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:37.000000Z"}, {"uuid": "1d82e07d-7749-4f4a-8647-cb9b906f1444", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/FunctionalProgramming.activitypub.awakari.com.ap.brid.gy/post/3m4wvrrgqt3d2", "content": "", "creation_timestamp": "2025-11-06T06:11:39.349677Z"}, {"uuid": "b446f7a4-cc6f-4649-949c-58f5207cb3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30963", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3m4wvs4btns2r", "content": "", "creation_timestamp": "2025-11-06T06:11:40.140905Z"}, {"uuid": "d760a0e9-851d-4284-8c98-316cf5baa952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4rsc7akb7x2", "content": "", "creation_timestamp": "2025-11-04T05:26:06.000060Z"}, {"uuid": "18350025-61ed-4aba-a505-3366ecae8484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/arpsyndicate/1921", "content": "#ExploitObserverAlert\n\nCVE-2022-30964\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30964. Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T05:27:39.000000Z"}, {"uuid": "df16bd11-25c0-413b-a2ee-7f3dd5f80ee0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/arpsyndicate/1982", "content": "#ExploitObserverAlert\n\nCVE-2022-30966\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30966. Jenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T12:28:01.000000Z"}, {"uuid": "329ae7e4-086e-4467-83fb-47d03e5423d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30966", "type": "seen", "source": "https://t.me/cibsecurity/42827", "content": "\u203c CVE-2022-30966 \u203c\n\nJenkins Random String Parameter Plugin 1.0 and earlier does not escape the name and description of Random String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:59.000000Z"}, {"uuid": "c0b05ee6-5c2e-4dc6-bd58-b5e18326cba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://t.me/cibsecurity/42826", "content": "\u203c CVE-2022-30960 \u203c\n\nJenkins Application Detector Plugin 1.0.8 and earlier does not escape the name of Chois Application Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:57.000000Z"}, {"uuid": "79f61453-bc83-445b-9b86-f5794f8ea9b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://t.me/cibsecurity/42823", "content": "\u203c CVE-2022-30968 \u203c\n\nJenkins vboxwrapper Plugin 1.3 and earlier does not escape the name and description of VBox node parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:53.000000Z"}, {"uuid": "bf937dc2-ae9f-4824-a3bc-cbc1eabb7b17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-3096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15162", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-3096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The WP Total Hacks WordPress plugin through 4.7.2 does not prevent low privilege users from modifying the plugin's settings. This could allow users such as subscribers to perform Stored Cross-Site Scripting attacks against other users, like administrators, due to the lack of sanitisation and escaping as well.\n\ud83d\udccf Published: 2022-10-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-06T15:46:38.482Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/46996537-a874-4b2e-9cd7-7d0832f9704d", "creation_timestamp": "2025-05-06T16:22:05.000000Z"}, {"uuid": "036f87dc-a972-40bc-a715-2472dba3c853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30968", "type": "seen", "source": "https://t.me/arpsyndicate/1871", "content": "#ExploitObserverAlert\n\nCVE-2022-30968\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30968. Jenkins vboxwrapper Plugin 1.3 and earlier does not escape the name and description of VBox node parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T00:31:24.000000Z"}, {"uuid": "72f1cc99-27e1-400e-91ea-ee759babeef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30962", "type": "seen", "source": "https://t.me/arpsyndicate/1892", "content": "#ExploitObserverAlert\n\nCVE-2022-30962\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30962. Jenkins Global Variable String Parameter Plugin 1.2 and earlier does not escape the name and description of Global Variable String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T02:21:32.000000Z"}, {"uuid": "623bf9f9-bd3a-4c20-af31-6d51230a4d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30964", "type": "seen", "source": "https://t.me/cibsecurity/42820", "content": "\u203c CVE-2022-30964 \u203c\n\nJenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:49.000000Z"}, {"uuid": "efda405d-b5b4-4782-8a1f-8e706870d3fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30969", "type": "seen", "source": "https://t.me/cibsecurity/42819", "content": "\u203c CVE-2022-30969 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:48.000000Z"}, {"uuid": "cf511808-e2a9-4639-a1df-d8b2c972aee6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30962", "type": "seen", "source": "https://t.me/cibsecurity/42816", "content": "\u203c CVE-2022-30962 \u203c\n\nJenkins Global Variable String Parameter Plugin 1.2 and earlier does not escape the name and description of Global Variable String parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:43.000000Z"}]}