{"vulnerability": "CVE-2022-30967", "sightings": [{"uuid": "b7a53ffd-a709-4fed-943c-7cc0ae73bad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m4yscmia6ii2", "content": "", "creation_timestamp": "2025-11-07T00:14:53.105543Z"}, {"uuid": "dea218bd-0bc2-4454-b8aa-6c5434da6992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-30967", "type": "seen", "source": "https://t.me/arpsyndicate/1970", "content": "#ExploitObserverAlert\n\nCVE-2022-30967\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2022-30967. Jenkins Selection tasks Plugin 1.0 and earlier does not escape the name and description of Script Selection task variable parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.\n\nFIRST-EPSS: 0.000770000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-18T11:06:17.000000Z"}]}