First published: Mon Apr 30 2007(Updated: )
The Yahoo! UI framework exchanges data using JavaScript Object Notation (JSON) without an associated protection scheme, which allows remote attackers to obtain the data via a web page that retrieves the data through a URL in the SRC attribute of a SCRIPT element and captures the data using other JavaScript code, aka "JavaScript Hijacking."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yahoo Ui Library | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.