CVE-2020-16242

The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow an attacker to trick application users into performing critical application actions that include, but are not limited to, adding and updating accounts.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ge:s2020_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:s2020:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ge:s2024_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ge:s2024:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:07

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-20-266-02 - Third Party Advisory, US Government Resource

Information

Published : 2020-09-25 18:15

Updated : 2024-11-21 05:07


NVD link : CVE-2020-16242

Mitre link : CVE-2020-16242

CVE.ORG link : CVE-2020-16242


JSON object : View

Products Affected

ge

  • s2024
  • s2020
  • s2024_firmware
  • s2020_firmware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')