Описание
The Dojo framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:dojo_toolkit:dojo_toolkit:*:*:*:*:*:*:*:*
EPSS
Процентиль: 58%
0.00371
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The Dojo framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
EPSS
Процентиль: 58%
0.00371
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other