Max CVSS | 7.8 | Min CVSS | 5.0 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-2381 | 5.0 |
The MochiKit framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCR
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2378 | 5.0 |
The Google Web Toolkit (GWT) framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC at
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2377 | 5.0 |
The Getahead Direct Web Remoting (DWR) framework 1.1.4 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a U
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2385 | 5.0 |
The Yahoo! UI framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SC
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2379 | 5.0 |
The jQuery framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIP
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2382 | 5.0 |
The Moo.fx framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIP
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2376 | 5.0 |
The Dojo framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2384 | 7.8 |
The Script.aculo.us framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute o
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2383 | 5.0 |
The Prototype (prototypejs) framework before 1.5.1 RC3 exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a U
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 | |
CVE-2007-2380 | 5.0 |
The Microsoft Atlas framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute o
|
14-02-2024 - 01:17 | 30-04-2007 - 23:19 |