{"vulnerability": "cve-2022-30970", "sightings": [{"uuid": "dacbb148-7eb5-4ebd-a9ee-90c1bbe3e45a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-30970", "type": "seen", "source": "https://t.me/cibsecurity/42808", "content": "\u203c CVE-2022-30970 \u203c\n\nJenkins Autocomplete Parameter Plugin 1.1 and earlier references Dropdown Autocomplete parameter and Auto Complete String parameter names in an unsafe manner from Javascript embedded in view definitions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-17T18:27:31.000000Z"}]}