SearchBlox product with version before 9.2.1 is vulnerable to stored cross-site scripting at multiple user input parameters. In SearchBlox products multiple parameters are not sanitized/validate properly which allows an attacker to inject malicious JavaScript.
References
| Link | Resource |
|---|---|
| https://developer.searchblox.com/v9.2/changelog/version-921 | Release Notes |
| https://developer.searchblox.com/v9.2/changelog/version-921 | Release Notes |
Configurations
History
21 Nov 2024, 04:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://developer.searchblox.com/v9.2/changelog/version-921 - Release Notes |
08 Sep 2023, 16:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Searchblox
Searchblox searchblox |
|
| CPE | cpe:2.3:a:searchblox:searchblox:*:*:*:*:*:*:*:* | |
| References | (MISC) https://developer.searchblox.com/v9.2/changelog/version-921 - Release Notes | |
| CWE | CWE-79 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
05 Sep 2023, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-09-05 20:15
Updated : 2024-11-21 04:54
NVD link : CVE-2020-10128
Mitre link : CVE-2020-10128
CVE.ORG link : CVE-2020-10128
JSON object : View
Products Affected
searchblox
- searchblox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
