An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
broadcom symantec identity governance and administration 14.3 |
||
broadcom symantec identity governance and administration 14.4.1 |
||
broadcom symantec identity governance and administration 14.4.2 |
||
broadcom symantec identity manager 14.4 |
||
broadcom symantec identity manager 14.3 |