"value":"A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /setup_smtp in smtp_server, smtp_user, smtp_password and smtp_email_address parameters. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads."
"value":"Se ha descubierto una vulnerabilidad en VX Search Enterprise que afecta a la versi\u00f3n 10.2.14 y que podr\u00eda permitir a un atacante ejecutar XSS persistente a trav\u00e9s de /setup_smtp en los par\u00e1metros smtp_server, smtp_user, smtp_password y smtp_email_address. Esta vulnerabilidad podr\u00eda permitir que un atacante almacene payloads de JavaScript maliciosos en el sistema para que se activen cuando se carga la p\u00e1gina."