"value":"\n\n\nAn attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the \"autorefresh\" parameter.\n\n\n\n"
"value":"\n\n<p>Westermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities. <span style=\"background-color: var(--wht);\">The reported cross-site scripting will be mitigated in a future report.</span></p>\n\n<br>"
}
],
"value":"\nWestermo recommends following best practices for hardening, such as restricting access, disable unused services (attack surface reduction), etc., to mitigate the reported vulnerabilities.\u00a0\u00a0The reported cross-site scripting will be mitigated in a future report.\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Aar\u00f3n Flecha Men\u00e9ndez, Iv\u00e1n Alonso \u00c1lvarez and V\u00edctor Bello Cuevas reported these vulnerabilities to CISA."