A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability.
History

Tue, 19 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2024-11-19T19:47:14.378Z

Reserved: 2022-12-27T12:19:39.466Z

Link: CVE-2020-36634

cve-icon Vulnrichment

Updated: 2024-08-04T17:30:08.391Z

cve-icon NVD

Status : Modified

Published: 2022-12-27T13:15:11.047

Modified: 2024-11-21T05:29:56.910

Link: CVE-2020-36634

cve-icon Redhat

No data.