Логотип exploitDog
bind:CVE-2007-2378
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-2378

Количество 3

Количество 3

nvd логотип

CVE-2007-2378

больше 18 лет назад

The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2007-2378

больше 18 лет назад

The Google Web Toolkit (GWT) framework exchanges data using JavaScript ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-49c3-6339-jcv2

больше 3 лет назад

The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2007-2378

The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

CVSS2: 5
0%
Низкий
больше 18 лет назад
debian логотип
CVE-2007-2378

The Google Web Toolkit (GWT) framework exchanges data using JavaScript ...

CVSS2: 5
0%
Низкий
больше 18 лет назад
github логотип
GHSA-49c3-6339-jcv2

The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу