{"vulnerability": "cve-2022-30960", "sightings": [{"uuid": "c0b05ee6-5c2e-4dc6-bd58-b5e18326cba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://t.me/cibsecurity/42826", "content": "\u203c CVE-2022-30960 \u203c\n\nJenkins Application Detector Plugin 1.0.8 and earlier does not escape the name of Chois Application Version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:57.000000Z"}, {"uuid": "06710e58-5765-48c2-8d43-538091fe03f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30960", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4v23eqhkgw2", "content": "", "creation_timestamp": "2025-11-05T12:23:33.998454Z"}]}