Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2381

Опубликовано: 30 апр. 2007
Источник: debian
EPSS Низкий

Описание

The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

Примечания

  • see http://www.fortifysoftware.com/servlet/downloads/public/JavaScript_Hijacking.pdf

  • This allows to steal data from affected websites. Therefore web applications should

  • only be considered vunerabile if they process confidential data.

  • The frameworks should be fixed in any case.

EPSS

Процентиль: 58%
0.00371
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

nvd
больше 18 лет назад

The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

github
больше 3 лет назад

The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

EPSS

Процентиль: 58%
0.00371
Низкий