A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-11-19T19:47:14.378Z
Reserved: 2022-12-27T12:19:39.466Z
Link: CVE-2020-36634

Updated: 2024-08-04T17:30:08.391Z

Status : Modified
Published: 2022-12-27T13:15:11.047
Modified: 2024-11-21T05:29:56.910
Link: CVE-2020-36634

No data.