CVE-2007-2382 in Moo.fxinfo

Summary

The Moo.fx framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Reservation

04/30/2007

Disclosure

04/30/2007

Entries

1

CPE

ready

CVSS

5.3

EPSS

0.00295

Activities

Very Low

Sources

Might our Artificial Intelligence support you?

Check our Alexa App!