Логотип exploitDog
bind:CVE-2023-41708
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-41708

Количество 2

Количество 2

nvd логотип

CVE-2023-41708

почти 2 года назад

References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-jx74-v4wj-gvx2

почти 2 года назад

References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.

CVSS3: 5.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-41708

References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.

CVSS3: 5.4
0%
Низкий
почти 2 года назад
github логотип
GHSA-jx74-v4wj-gvx2

References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.

CVSS3: 5.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу