SearchBlox product with version before 9.2.1 is vulnerable to stored cross-site scripting at multiple user input parameters. In SearchBlox products multiple parameters are not sanitized/validate properly which allows an attacker to inject malicious JavaScript.
References
Link | Resource |
---|---|
https://developer.searchblox.com/v9.2/changelog/version-921 | Release Notes |
https://developer.searchblox.com/v9.2/changelog/version-921 | Release Notes |
Configurations
History
21 Nov 2024, 04:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://developer.searchblox.com/v9.2/changelog/version-921 - Release Notes |
08 Sep 2023, 16:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
First Time |
Searchblox searchblox
Searchblox |
|
References | (MISC) https://developer.searchblox.com/v9.2/changelog/version-921 - Release Notes | |
CWE | CWE-79 | |
CPE | cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:* |
05 Sep 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-05 20:15
Updated : 2024-11-21 04:54
NVD link : CVE-2020-10128
Mitre link : CVE-2020-10128
CVE.ORG link : CVE-2020-10128
JSON object : View
Products Affected
searchblox
- searchblox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')