Логотип exploitDog
bind:CVE-2007-3910
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2007-3910

Количество 4

Количество 4

ubuntu логотип

CVE-2007-3910

около 18 лет назад

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

CVSS2: 4.3
EPSS: Низкий
nvd логотип

CVE-2007-3910

около 18 лет назад

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

CVSS2: 4.3
EPSS: Низкий
debian логотип

CVE-2007-3910

около 18 лет назад

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows re ...

CVSS2: 4.3
EPSS: Низкий
github логотип

GHSA-447c-2gc5-77jh

больше 3 лет назад

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2007-3910

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

CVSS2: 4.3
1%
Низкий
около 18 лет назад
nvd логотип
CVE-2007-3910

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

CVSS2: 4.3
1%
Низкий
около 18 лет назад
debian логотип
CVE-2007-3910

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows re ...

CVSS2: 4.3
1%
Низкий
около 18 лет назад
github логотип
GHSA-447c-2gc5-77jh

Cross-site scripting (XSS) vulnerability in Bandersnatch 0.4 allows remote attackers to inject arbitrary JavaScript via a Jabber resource name and possibly other data items, which are stored in conversation logs.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу